Follow
Vlad-Florin Dragoi
Title
Cited by
Cited by
Year
Algebraic properties of polar codes from a new polynomial formalism
M Bardet, V Dragoi, A Otmani, JP Tillich
2016 IEEE International Symposium on Information Theory (ISIT), 230-234, 2016
1582016
Cryptanalysis of the McEliece public key cryptosystem based on polar codes
M Bardet, J Chaulet, V Dragoi, A Otmani, JP Tillich
Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016 …, 2016
842016
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
PL Cayrel, B Colombier, VF Drăgoi, A Menu, L Bossuet
Annual International Conference on the Theory and Applications of …, 2021
34*2021
Survey on cryptanalysis of code-based cryptography: From theoretical to physical attacks
V Drăgoi, T Richmond, D Bucerzan, A Legay
2018 7th international conference on computers communications and control …, 2018
292018
Weak keys for the quasi-cyclic MDPC public key encryption scheme
M Bardet, V Dragoi, JG Luque, A Otmani
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
262016
Fast reliability ranking of matchstick minimal networks
VF Drǎgoi, V Beiu
Networks 79 (4), 479-500, 2022
212022
Why reliability for computing needs rethinking
V Beiu, VF Drăgoi, RM Beiu
2020 International Conference on Rebooting Computing (ICRC), 16-25, 2020
182020
Evolution of the McEliece public key encryption scheme
D Bucerzan, V Dragoi, HT Kalachi
Innovative Security Solutions for Information Technology and Communications …, 2017
172017
Profiled side-channel attack on cryptosystems based on the binary syndrome decoding problem
B Colombier, VF Drăgoi, PL Cayrel, V Grosso
IEEE Transactions on Information Forensics and Security 17, 3407-3420, 2022
152022
How reliable are compositions of series and parallel networks compared with hammocks?
V Dragoi, SR Cowell, V Beiu, S Hoara, P Gaspar
International Journal of Computers Communications & Control 13 (5), 772-791, 2018
152018
Efficient approximation of two-terminal networks reliability polynomials using cubic splines
G Cristescu, VF Drăgoi
IEEE Transactions on Reliability 70 (3), 1193-1203, 2021
142021
An algebraic approach for the resolution of algorithmic problems raised by cryptography and coding theory
VF Dragoi
Normandie Université, 2017
14*2017
Improved timing attacks against the secret permutation in the McEliece PKC
D Bucerzan, PL Cayrel, V Dragoi, T Richmond
International Journal of Computers, Communications and Control, 2017
142017
Cryptanalysis of a public key encryption scheme based on QC-LDPC and QC-MDPC codes
V Dragoi, HT Kalachi
IEEE Communications letters 22 (2), 264-267, 2017
132017
On the Closed-form Weight Enumeration of Polar Codes: 1.5d-weight Codewords
VF Drăgoi, M Rowshan, J Yuan
IEEE Transactions on Communications, 2024
11*2024
Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem.
B Colombier, VF Dragoi, PL Cayrel, V Grosso
IACR Cryptol. ePrint Arch. 2022, 125, 2022
112022
Vulnerabilities of the McEliece variants based on polar codes
V Drăgoi, V Beiu, D Bucerzan
International Conference on Security for Information Technology and …, 2018
92018
Hammocks versus hammock
V Beiu, SR Cowell, V Drăgoi, S Hoară, P Gaspar
2018 7th International Conference on Computers Communications and Control …, 2018
92018
Can series and parallel compositions improve on hammocks?
V Drăgoi, SR Cowell, S Hoară, P Gaşpar, V Beiu
2018 7th International Conference on Computers Communications and Control …, 2018
82018
Generalized inverse based decoding
FL Ţiplea, VF Drăgoi
2022 IEEE International Symposium on Information Theory (ISIT), 2791-2796, 2022
62022
The system can't perform the operation now. Try again later.
Articles 1–20