Skip to Main content Skip to Navigation


hal-00068424v1  Journal articles
Thierry Pierre BergerPierre Loidreau. How to Mask the Structure of Codes for a Cryptographic Use
Designs, Codes and Cryptography, Springer Verlag, 2005, 35, pp.63-79
hal-00976374v1  Conference papers
Jean-Charles FaugèreFrançoise Levy-Dit-VehelLudovic Perret. Cryptanalysis of MinRank
CRYPTO 2008 - 28th Annual International Cryptology Conference, Aug 2008, Santa Barbara, CA, United States. pp.280-296, ⟨10.1007/978-3-540-85174-5_16⟩
hal-00988797v1  Book sections
Françoise Levy-Dit-VehelLudovic Perret. A Polly Cracker System Based on Satisfiability
Progress in Computer Science and Applied Logic Volume 23, 23, Springer, pp.177-192, 2004, 978-3-0348-9602-3. ⟨10.1007/978-3-0348-7865-4_11⟩
hal-00988804v1  Book sections
Françoise Levy-Dit-VehelLudovic Perret. Attacks on Public-Key Cryptosystems Based on Free Partially Commutative Monoids and Groups
Progress in Cryptology - INDOCRYPT 2004, 3348, Springer, pp.275-289, 2004, Lecture Notes in Computer Science, 978-3-540-24130-0. ⟨10.1007/978-3-540-30556-9_22⟩
hal-00978821v1  Journal articles
Françoise Levy-Dit-VehelLudovic Perret. On Wagner-Magyarik Cryptosystem
Lecture Notes in Computer Science, Springer, 2006, 3969, pp.316-329. ⟨10.1007/11779360_25⟩
hal-00974889v1  Journal articles
Françoise Levy-Dit-VehelLudovic Perret. Security Analysis of Word Problem-Based Cryptosystems
Designs, Codes and Cryptography, Springer Verlag, 2010, 54 (1), pp.29-41. ⟨10.1007/s10623-009-9307-x⟩
...
hal-01097293v1  Journal articles
P Loidreau. Asymptotic behaviour of codes in rank metric over finite fields
Designs, Codes and Cryptography, Springer Verlag, 2014, 71 (1), pp.105-118. ⟨10.1007/s10623-012-9716-0⟩
hal-00967388v1  Journal articles
Pierre LoidreauNicolas Sendrier. Weak keys in McEliece public-key cryptosystem.
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2001, 47, pp.1207-1211
hal-01008784v1  Journal articles
Pierre Loidreau. Introduction à la cryptographie
LINUX Magazine - Hors Série Sécurité, 2001, 8
hal-00967387v1  Journal articles
Pierre Loidreau. Codes derived from binary Goppa codes
Problems of Information Transmission, MAIK Nauka/Interperiodica, 2001
hal-00989856v1  Journal articles
Pierre Loidreau. Le partage de secret
MISC - Le journal de la sécurité informatique, Lavoisier, 2002, 3
hal-00989852v1  Journal articles
Pierre Loidreau. L'identification à divulgation nulle de connaissance
MISC - Le journal de la sécurité informatique, Lavoisier, 2002, 1
hal-00989030v1  Journal articles
Pierre Loidreau. Génération d'aléa en cryptographie
MISC - Le journal de la sécurité informatique, Lavoisier, 2003, 6
hal-00989863v1  Journal articles
Pierre Loidreau. Le transfert inconscient
MISC - Le journal de la sécurité informatique, Lavoisier, 2002, 2
hal-00982663v1  Journal articles
Pierre Loidreau. Pour quelques bits d'information
MISC - Le journal de la sécurité informatique, Lavoisier, 2005, 20
hal-00967389v1  Journal articles
Pierre Loidreau. Sur la reconstruction des polynômes linéaires : un nouvel algorithme de décodage des codes de Gabidulin
Comptes rendus de l'Académie des sciences. Série I, Mathématique, Elsevier, 2004