Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
Decoding Rank Metric Reed–Muller Codes
Couvreur, A. & Pratihar, R., 1 Jan 2026, In: IEEE Transactions on Information Theory. 72, 2, p. 1011-1029 19 p.Research output: Contribution to journal › Article › peer-review
Open Access -
Decoding Algorithms for Tensor Codes
François, L., Byrne, E. & Couvreur, A., 1 Jan 2025, ISIT 2025 - 2025 IEEE International Symposium on Information Theory, Proceedings. Institute of Electrical and Electronics Engineers Inc., (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
FOLEAGE: F4OLE-Based Multi-party Computation for Boolean Circuits
Bombar, M., Bui, D., Couteau, G., Couvreur, A., Ducros, C. & Servan-Schreiber, S., 1 Jan 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 69-101 33 p. (Lecture Notes in Computer Science; vol. 15489 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Highway to Hull: An Algorithm for Solving the General Matrix Code Equivalence Problem
Couvreur, A. & Levrat, C., 1 Jan 2025, Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings. Tauman Kalai, Y. & Kamara, S. F. (eds.). Springer Science and Business Media Deutschland GmbH, p. 253-283 31 p. (Lecture Notes in Computer Science; vol. 16000 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
MinRank Gabidulin Encryption Scheme on Matrix Codes
Aragon, N., Couvreur, A., Dyseryn, V., Gaborit, P. & Vinçotte, A., 1 Jan 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 68-100 33 p. (Lecture Notes in Computer Science; vol. 15487 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
On the Structure of the Schur Squares of Twisted Generalized Reed-Solomon Codes and Application to Cryptanalysis
Couvreur, A., Pratihar, R., Tanısalı, N. & Zappatore, I., 1 Jan 2025, Post-Quantum Cryptography - 16th International Workshop, PQCrypto 2025, Proceedings. Niederhagen, R. & Saarinen, M.-J. O. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-34 32 p. (Lecture Notes in Computer Science; vol. 15577 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Recursive Decoding of Binary Rank Reed-Muller Codes and Plotkin Construction for Matrix Codes
Couvreur, A. & Pratihar, R., 1 Jan 2025, ISIT 2025 - 2025 IEEE International Symposium on Information Theory, Proceedings. Institute of Electrical and Electronics Engineers Inc., (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
A Proof of the Brill-Noether Method from Scratch
Berardini, E., Couvreur, A. & Lecerf, G., 15 Mar 2024, In: ACM Communications in Computer Algebra. 57, 4, p. 200-229 30 p.Research output: Contribution to journal › Article › peer-review
Open Access -
Efficient computation of Riemann–Roch spaces for plane curves with ordinary singularities
Abelard, S., Couvreur, A. & Lecerf, G., 1 Nov 2024, In: Applicable Algebra in Engineering, Communication and Computing. 35, 6, p. 739-804 66 p.Research output: Contribution to journal › Article › peer-review
Open Access -
A New Approach Based on Quadratic Forms to Attack the McEliece Cryptosystem
Couvreur, A., Mora, R. & Tillich, J. P., 1 Jan 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-38 36 p. (Lecture Notes in Computer Science; vol. 14441 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access