We bring in here a novel algebraic approach for attacking the McEliece
c...
Secure computation often benefits from the use of correlated randomness ...
In the present article, we discuss the decoding of Gabidulin and related...
These lecture notes have been written for a course at the Algebraic Codi...
We consider the decoding of rank metric codes assuming the error matrix ...
In 1874 Brill and Noether designed a seminal geometric method for comput...
It is a long standing open problem to find search to decision reductions...
We discuss the decoding of Gabidulin and interleaved Gabidulin codes. We...
This note completes a talk given at the conference Curves over Finite Fi...
This article discusses the decoding of Gabidulin codes and shows how to
...
Extended Affine (EA) equivalence is the equivalence relation between two...
In recent years, the notion of rank metric in the context of coding theo...
This article discusses the security of McEliece-like encryption schemes ...
This article surveys the development of the theory of algebraic geometry...
This paper extends the study of rank-metric codes in extension fields
𝕃 ...
We introduce in this article a new method to estimate the minimum distan...
We present a new decoding algorithm based on error locating pairs and
co...
DAGS scheme is a key encapsulation mechanism (KEM) based on quasi-dyadic...
We construct algebraic geometric codes from del Pezzo surfaces and focus...
We present a polynomial time attack of a rank metric code based encrypti...
We present a key recovery attack against Y. Wang's Random Linear Code
En...
We present an efficient key recovery attack on code based encryption sch...