DAGS: Key encapsulation using dyadic GS codes G Banegas, PSLM Barreto, BO Boidje, PL Cayrel, GN Dione, K Gaj, ... Journal of Mathematical Cryptology 12 (4), 221-239, 2018 | 36 | 2018 |
Generalization of BJMM-ISD using May-Ozerov nearest neighbor algorithm over an arbitrary finite field CT Gueye, JB Klamti, S Hirose International conference on codes, cryptology, and information security, 96-109, 2017 | 33 | 2017 |
DAGS: Key encapsulation for dyadic GS codes G Banegas, PSLM Barreto, BO Boidje, PL Cayrel, GN Dione, K Gaj, ... NIST PQC Round 1, 4, 2017 | 20 | 2017 |
A NP-complete problem in coding theory with application to code based cryptography TP Berger, CT Gueye, JB Klamti International Conference on Codes, Cryptology, and Information Security, 230-237, 2017 | 17 | 2017 |
Generalized subspace subcodes with application in cryptology TP Berger, CT Gueye, JB Klamti IEEE Transactions on Information Theory 65 (8), 4641-4657, 2019 | 14 | 2019 |
Dags: Reloaded revisiting dyadic key encapsulation G Banegas, PSLM Barreto, BO Boidje, PL Cayrel, GN Dione, K Gaj, ... Code-Based Cryptography: 7th International Workshop, CBC 2019, Darmstadt …, 2019 | 8 | 2019 |
Designing a public key cryptosystem based on quasi-cyclic subspace subcodes of Reed-Solomon codes TP Berger, CT Gueye, JB Klamti, O Ruatta Algebra, Codes and Cryptology: First International Conference, A2C 2019 in …, 2019 | 7 | 2019 |
Post-quantum two-party adaptor signature based on coding theory JB Klamti, MA Hasan Cryptography 6 (1), 6, 2022 | 5 | 2022 |
A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial B Seck, PL Cayrel, VF Dragoi, I Diop, M Barbier, JB Klamti, V Grosso, ... International Conference on Cryptology in Africa, 105-125, 2023 | 2 | 2023 |
A code-based hybrid signcryption scheme JB Klamti, MA Hasan Journal of Mathematical Cryptology 17 (1), 20220002, 2023 | 2 | 2023 |
Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes B Seck, CT Gueye, GN Dione, JB Klamti, PL Cayrel, I Diop, O Ndiaye Code-Based Cryptography Workshop, 77-89, 2022 | 1 | 2022 |
Quasi-dyadic Girault identification scheme BO Boidje, CT Gueye, GN Dione, JB Klamti Codes, Cryptology and Information Security: Third International Conference …, 2019 | 1 | 2019 |
Revocable policy-based chameleon hash using lattices JB Klamti, MA Hasan Journal of Mathematical Cryptology 18 (1), 20230012, 2024 | | 2024 |
Reducing the Goppa polynomial search complexity using a Template Attack on Classic McEliece B Seck, PL Cayrel, I Diop, M Barbier, JB Klamti, VF Dragoi Africacrypt, 2022 | | 2022 |
Post-Quantum Two-Party Adaptor Signature Based on Coding Theory. Cryptography 2022, 6, 6 JB Klamti, MA Hasan s Note: MDPI stays neutral with regard to jurisdictional claims in published …, 2022 | | 2022 |
Security Analysis of a Cryptosystem Based on Subspace Subcodes TP Berger, AN Gueye, CT Gueye, MA Hasan, JB Klamti, E Persichetti, ... Code-Based Cryptography Workshop, 42-59, 2021 | | 2021 |
Improvement of Binary and Non Binary Statistical Decoding Algorithm PL Cayrel, CT Gueye, JA Khan, JB Klamti, E Persichetti Information Security and Cryptology–ICISC 2019: 22nd International …, 2020 | | 2020 |
DAGS: Reloaded Revisiting Dyadic Key Encapsulation PS Barreto, G Banegas, BO Boidje, PL Cayrel, GN Dione, K Gaj, ... | | 2019 |
DAGS: Reloaded Revisiting Dyadic Key Encapsulation GND Cayrel, K Gaj, CT Gueye, R Haeussler, JB Klamti, O N’diaye, ... | | |