Accueil > Research > Publications

Publications

Dernier ajout : 19 décembre 2011.

Papers in submission : 2

You can also have a look at my :
- dblp bibliography
- google scholar profil
- HAL page

The (slides of the) talks are here.

represents my best results

 Book chapters

  1. Cryptography Based on Error Correcting Codes : A Survey
    M. Repka and P. - L. Cayrel
    Multidisc. Persp. in Cryptology and Information Security, 133 - 156 2014 [DOI]
  2. Identity - based Identification and Signature Schemes using Error Correcting Codes
    P. - L. Cayrel, P. Gaborit and M. Girault
    Identity - Based Cryptography, 119-134 2009 [DOI]

 International journals

  1. A Pseudorandom Number Generator Based on Worst-Case Lattice Problems
    P. - L. Cayrel, M. Meziani, O. Ndiaye, R. Lindner and R. Silva
    AAECC 28 1-12 2017 [DOI]
  2. RFID Authentication Protocols Based on Error-Correcting Codes : A Survey
    N. Chikouche, F. Cherif, P. - L. Cayrel and M. Benmohammed
    Wireless Personal Communications Springer 94 1-19 2017 [DOI]
  3. Improved Timing Attacks against the Secret Permutation in the McEliece PKC
    D. Bucerzan, P. - L. Cayrel, V. Dragoi and T. Richmond
    Inter. Journal of Computers Communications & Control, 12(1) 7-25 2017 [DOI]
  4. On lower bounds for Information Set Decoding over Fq and on the effect of Partial Knowledge
    R.Niebuhr, E. Persichetti, P. - L. Cayrel, S. Bulygin and J. Buchmann
    Inter. Journal of Information and Coding Theory, (1) 47-78 2017 [DOI]
  5. NP-completeness of the random binary quasi-dyadic Coset Weight problem and the random binary quasi-dyadic Subspace Weight problem
    P. - L. Cayrel, M. K. Diagne and C. T. Gueye
    Gulf Journal of Mathematics, 4(4) 206-216 2016 [DOI]
  6. Extended Security Arguments for Signature Schemes
    Ö. Dagdelen, D. Galindo, P. Véron, S. M. El Yousfi Alaoui and P. - L. Cayrel
    Designs, Codes and Cryptography, 78(2) 441 - 461 2016 [DOI]
  7. Critical attacks in code-based cryptography
    P. - L. Cayrel, C. T. Gueye, O. Ndiaye and R. Niebuhr
    Inter. Journal of Information and Coding Theory, 3(2) 158-176 2015 [DOI]
  8. A Secure Code-Based Authentication Scheme for RFID Systems
    N. Chikouche, F. Cherif, P. - L. Cayrel and M. Benmohammed
    Inter. Journal of Computer Network and Information Security 1-9 2015 [DOI] [pdf]
  9. Improved RFID Authentication Protocol based on Randomized McEliece Cryptosystem
    N. Chikouche, F. Cherif, P. - L. Cayrel and M. Benmohammed
    Inter. Journal of Network Security, 17(4) 413-422 2015 [DOI]
  10. Improved zero-knowledge identification with lattices
    P. - L. Cayrel, R. Lindner, M. Rückert and R. Silva
    Tatracrypt Mountains Mathematical Publications, 53 33-63 2012 [DOI] [pdf]
  11. Post-quantum cryptography : lattice identification schemes
    R. Silva, P. - L. Cayrel and J. Buchmann
    Publicationes Mathematicae Debrecen, 79(3-4) 729-748 2011 [pdf] [bib]
  12. A New Efficient Threshold Ring Signature Scheme based on Coding Theory 
    C. Aguilar Melchor, P. - L. Cayrel, P. Gaborit and F. Laguillaumie
    IEEE Trans. Inf. Theory, 57(7) 4833 - 4842 2011 [pdf] [bib]
  13. Quasi-cyclic codes as codes over rings of matrices
    P. - L. Cayrel, C. Chabot and A. Necer
    Finite Fields and their Applications, 16(2) 100-115 2010 [pdf] [bib] [talk]

 International conferences/workshops

  1. Efficient Implementation of Hybrid Encryption from Coding Theory
    P. - L. Cayrel, C. T. Gueye, E. H. Modou Mboup, O. Ndiaye and E. Persichetti
    C2SI 2017 LNCS 10194, 254 - 264 [DOI]
  2. DPA on the Secure Bit Permutation in the McEliece PKC
    M. Petrvalsky, T. Richmond, M. Drutarovsky, P. - L. Cayrel and V. Fischer
    Radioelek. 2016 IEEE, 132 - 137. [DOI]
  3. New GPT cryptosystem based on the (u,u + v)-construction codes
    H. Moufek, R. Mahdjoubi, P. - L. Cayrel and K. Guenda
    ICCC 2015 71 - 78. [DOI]
  4. NP-completeness of the coset weight problem for quasi-dyadic codes
    P. - L. Cayrel, K. Diagne and C. T. Gueye
    ICCC 2015 98-106. [DOI]
  5. SBS : A Fast and Provably Secure Code-Based Stream Cipher
    P. - L. Cayrel, M. Meziani and O. Ndiaye
    ICCC 2015 137-149. [DOI]
  6. A pseudorandom number generator based on worst-case lattice problems
    P. - L. Cayrel, M. Meziani, O. Ndiaye, R. Lindner and R. Silva
    ICCC 2015 150-162. [DOI]
  7. A Survey on RFID Authentication Protocols Based on Error-Correcting Codes
    N. Chikouche, F. Chérif, P. - L. Cayrel and M. Benmohammed
    ICCC 2015 203, poster. [DOI]
  8. Weaknesses in Two RFID Authentication Protocols
    N. Chikouche, F. Cherif, P. - L. Cayrel and M. Benmohammed
    C2SI 2015 LNCS 9084, 162-172. [DOI] [pdf]
  9. Countermeasure against the SPA Attack on an Embedded McEliece Cryptosystem
    M. Petrvalsky, T. Richmond, M. Drutarovsky, P. - L. Cayrel and V. Fischer
    MAREW 2015 IEEE, 462-466. [DOI] [pdf] [talk] [post.]
  10. Efficient Software Implementations of Code-based Hash Functions and Stream-Ciphers
    P. - L. Cayrel, M. Meziani, O. Ndiaye and Q. Santos
    WAIFI 2014 LNCS 9061, 187-203. [DOI] [pdf] [talk]
  11. Polynomial structures in code-based cryptography
    V. Dragoi, P. - L. Cayrel, B. Colombier and T. Richmond
    Indocrypt 2013 LNCS 8250, 286-296. [DOI] [pdf] [talk]
  12. Code-based identification and signature schemes in software
    S. M. El Yousfi Alaoui, P. - L. Cayrel, R. El Bansarkhani and G. Hoffmann
    MoCrySEn 2013 LNCS 8128, 122-136. [DOI] [pdf] [talk]
  13. A Secure Implementation of a Goppa Decoder
    T. Richmond, P. - L. Cayrel, V. Fischer and P. Véron
    Cryptarchi 2013
  14. Improving the Performance of the SYND Stream Cipher
    M. Meziani, G. Hoffmann and P. - L. Cayrel
    Africacrypt 2012 LNCS 7374, 99-116. [DOI] [pdf] [talk]
  15. Extended Security Arguments for Signature Schemes
    S. M. El Yousfi Alaoui, Ö. Dagdelen, P. Véron, D. Galindo and P. - L. Cayrel
    Africacrypt 2012 LNCS 7374, 19-34. [DOI] [talk]
  16. An improved threshold ring signature scheme based on error correcting codes
    P. - L. Cayrel, S. M. El Yousfi Alaoui, G. Hoffmann and P. Véron
    WAIFI 2012 LNCS 7369, 45-63. [DOI] [pdf] [talk]
  17. Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes 
    P. - L. Cayrel, G. Hoffmann and E. Persichetti
    PKC 2012 LNCS 7293, 138-155. [DOI] [web] [pdf] [talk]
  18. Broadcast attacks against code-based schemes
    R. Niebuhr and P. - L. Cayrel
    WEWoRC 2011 LNCS 7242, 1-17. [DOI] [pdf] [talk]
  19. Improved identity-based identification and signature schemes using Quasi-Dyadic Goppa codes
    S. M. El Yousfi Alaoui, P. - L. Cayrel and M. Meziani
    ISA 2011 CCIS 200, 146-155. [DOI] [pdf] [bib] [talk]
  20. S-FSB : An Improved Variant of the FSB Hash Family
    M. Meziani, Ö. Dagdelen, P. - L. Cayrel and S. M. El Yousfi Alaoui
    ISA 2011 CCIS 200, 132-145. [DOI] [web] [pdf] [bib] [talk]
  21. 2SC : an Efficient Code-based Stream Cipher
    M. Meziani, P. - L. Cayrel and S. M. El Yousfi Alaoui
    ISA 2011 CCIS 200, 111-122. [DOI] [web] [pdf] [bib] [talk]
  22. GPU Implementation of the Keccak Hash Function Family
    P. - L. Cayrel, G. Hoffmann and M. Schneider
    ISA 2011 CCIS 200, 33-42. [DOI] [web] [pdf] [bib]
  23. Recent progress in code-based cryptography
    P. - L. Cayrel, S. M. El Yousfi Alaoui, G. Hoffmann, M. Meziani and R. Niebuhr
    ISA 2011 CCIS 200, 21-32. [DOI] [pdf] [bib] [talk]
  24. Lattice-based Zero-knowledge Identification with Low Communication Cost
    R. Silva, P. - L. Cayrel and R. Lindner
    SBSEG 2011 [pdf] [bib]
  25. Hash Functions Based on Coding Theory
    M. Meziani, S. M. El Yousfi Alaoui and P. - L. Cayrel
    WCCCS 2011 32-37. [web] [pdf] [talk]
  26. Improving the efficiency of GBA against certain structured cryptosystems
    R.Niebuhr, P. - L. Cayrel and J. Buchmann
    WCC 2011 163-172. [pdf] [bib] [talk]
  27. A Lattice-Based Batch Identification Scheme
    R. Silva, P. - L. Cayrel and R. Lindner
    ITW 2011 IEEE, 215-219. [DOI] [pdf] [bib] [talk]
  28. Efficient implementation of code-based identification/signatures schemes
    P. - L. Cayrel, S. M. El Yousfi Alaoui, F. Günther, G. Hoffmann and H. Rother
    WEWoRC 2011 [web] [pdf] [bib] [talk]
  29. A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem 
    P. - L. Cayrel, P. Véron and S. M. El Yousfi Alaoui
    SAC 2010 LNCS 6544, 171-186. [DOI] [pdf] [bib] [talk]
  30. Quasi Dyadic CFS Signature Scheme
    P.S.L.M. Barreto, P. - L. Cayrel, R. Misoczki and R. Niebuhr
    Inscrypt 2010 LNCS 6584, 336-349. [DOI] [pdf] [bib] [talk]
  31. Improved Zero-knowledge Identification with Lattices
    P. - L. Cayrel, R. Lindner, M. Rückert and R. Silva
    ProvSec 2010 LNCS 6402, 1-16. [DOI] [pdf] [bib] [talk]
  32. A Lattice-Based Threshold Ring Signature Scheme
    P. - L. Cayrel, R. Lindner, M. Rückert and R. Silva
    Latincrypt 2010 LNCS 6212, 255-272. [DOI] [pdf] [bib] [talk]
  33. Post-Quantum Cryptography : Code-based Signatures
    P. - L. Cayrel and M. Meziani
    ISA 2010 LNCS 6059, 82-99. [DOI] [pdf] [bib]
  34. Attacking code/lattice-based cryptosystems using Partial Knowledge
    R.Niebuhr, P. - L. Cayrel, S. Bulygin and J. Buchmann
    Inscrypt 2010 SPC [pdf] [bib] [talk]
  35. Multi-Signature Scheme based on Coding Theory
    M. Meziani and P. - L. Cayrel
    ICCCIS 2010 186-192. [bib] [talk]
  36. Dual Construction of Stern-based Signature Schemes
    P. - L. Cayrel and S. M. El Yousfi Alaoui
    ICCCIS 2010 369-374. [pdf] [bib] [talk]
  37. Side channels attacks in code-based cryptography
    P. - L. Cayrel and F. Strenzke
    COSADE 2010 24-28. [pdf] [bib]
  38. On lower bounds for Information Set Decoding over Fq
    R. Niebuhr, P. - L. Cayrel, S. Bulygin and J. Buchmann
    SCC 2010 143-157. [pdf] [bib] [talk]
  39. McEliece/Niederreiter PKC : sensitivity to fault injection
    P. - L. Cayrel and P. Dusart
    FEAS 2010 IEEE, 1-6. [DOI] [bib]
  40. Reducing Key Length of the McEliece Cryptosystem 
    T. P. Berger, P. - L. Cayrel, P. Gaborit and A. Otmani
    Africacrypt 2009 LNCS 5580, 77-97. [DOI] [pdf] [bib] [talk]
  41. Fault injection’s sensitivity of the McEliece PKC
    P. - L. Cayrel and P. Dusart
    WEWoRC 2009 84-88. [pdf] [bib]
  42. New results on the Stern identification and signature scheme
    P. - L. Cayrel
    Bull. Brasov 2009 2(51), Series III, 3-10. [pdf] [talk]
  43. A New Efficient Threshold Ring Signature Scheme based on Coding Theory 
    C. Aguilar Melchor, P. - L. Cayrel and P. Gaborit
    PQCrypto 2008 LNCS 5299, 1-16. [DOI] [pdf] [bib] [talk]
  44. Secure Implementation of the Stern Signature Scheme for Low-Resource Devices
    P. - L. Cayrel, P. Gaborit and E. Prouff
    CARDIS 2008 LNCS 5189, 191-205. [DOI] [pdf] [bib] [talk]
  45. On Kabatianskii-Krouk-Smeets Signatures
    P. - L. Cayrel, A. Otmani and D. Vergnaud
    WAIFI 2007 LNCS 4547, 237-251. [DOI] [pdf] [bib] [talk]
  46. Improved algorithm to find equations for algebraic attacks for combiners with memory
    F. Armknecht, P. - L. Cayrel, P. Gaborit and O. Ruatta
    BFCA 2007 81-98. [pdf] [bib] [talk]
  47. Identity-based identification and signature schemes using correcting codes 
    P. - L. Cayrel, P. Gaborit and M. Girault
    WCC 2007 69-78. [DOI] [pdf] [bib] [talk]

 Invited talks

  1. Recent progress in code - based cryptography
    P. - L. Cayrel
    Tatracrypt 2012 and Cryptarchi 2012
  2. New results in code-based cryptography
    P. - L. Cayrel
    PQSM workshop 2010

 National conferences

  1. A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem
    P. - L. Cayrel, P. Véron and S. M. El Yousfi Alaoui
    KRYPTOTAG 2010 [pdf]
  2. Quasi Dyadic CFS Signature Scheme
    P.S.L.M. Barreto, P. - L. Cayrel, R. Misoczki and R. Niebuhr
    KRYPTOTAG 2010 [pdf] [talk]
  3. Algorithme de décodage (Reed-Muller)
    P. - L. Cayrel and R. Fourquet
    MAJECSTIC 2009 [pdf]
  4. Nouveaux résultats en cryptographie basée sur les codes correcteurs d’erreurs
    P. - L. Cayrel
    MAJECSTIC 2009 [pdf]
  5. Code-Based Signature Schemes
    P. - L. Cayrel
    KWE 2008 23 - 27 [pdf] [talk]
  6. Dis-moi ce que tu consommes, je te dirai qui tu es
    P. - L. Cayrel and N. El Mrabet
    MAJECSTIC 2008 [pdf] [talk]
  7. Schémas de signature prouvés sûrs fondés sur la théorie des codes correcteurs d’erreurs
    P. - L. Cayrel and L. Dallot
    MAJECSTIC 2008 [pdf]
  8. Attaques algébriques
    M. Barbier and P. - L. Cayrel
    MAJECSTIC 2008 [pdf] [talk]
  9. Algorithme amélioré de recherche d’équations dans le cas d’attaques algébriques des registres avec mémoire
    F. Armknecht, P. - L. Cayrel, P. Gaborit and O. Ruatta
    MAJECSTIC 2007 239 - 243 [pdf]

 Thesis

  1. Construction et optimisation des cryptosystèmes basés sur les codes correcteurs d’erreurs Ph.D. Université de Limoges, France 2008 [pdf]

My publications

All my publications

Articles de cette rubrique

SPIP | | Plan du site | Suivre la vie du site RSS 2.0

Habillage visuel © Kozlika sous Licence GPL