Publications
All
2024
2023
2021
2020
2018
2017
2015
Security assessment of the LG cryptosystem
(with Étienne Burle, Freddy Lende Metouke, and Ayoub Otmani)
Applicable Algebra in Engineering, Communication and Computing
, 2024
DOI: 10.1007/s00200-024-00671-5
On the Generalizations of the Rank Metric Over Finite Chain Rings
(with Hermann Tchatchiem Kamche)
Accepted to AfricaCrypt 2024 , 2024
(with Hermann Tchatchiem Kamche)
Applicable Algebra in Engineering, Communication and Computing , 2024
DOI
Low-rank parity-check codes over finite commutative rings
(with Hermann Tchatchiem Kamche, Franck Rivel Kamwa Djomou & Emmanuel Fouotsa)
Applicable Algebra in Engineering, Communication and Computing , 2024
DOI
On the rank decoding problem over finite principal ideal rings
(with Hermann Tchatchiem Kamche)
Advances in Mathematics of Communications , 2023
DOI
Generalization of low rank parity-check (LRPC) codes over the ring of integers modulo a positive integer
(with Franck Rivel Kamwa Djomou & Emmanuel Fouotsa)
Arabian Journal of Mathematics , 2021
DOI
On the failure of the smart approach of the GPT cryptosystem
Cryptologia , 2020
DOI
Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes
(with Philippe Gaborit & Ayoub Otmani)
Designs, Codes and Cryptography , 2018
DOI
Improved cryptanalysis of rank metric schemes based on Gabidulin codes
(with Ayoub Otmani & Selestin Ndjeya)
Designs, Codes and Cryptography , 2018
DOI
Cryptanalysis of a Public Key Encryption Scheme Based on QC-LDPC and QC-MDPC Codes
(with Vlad Dragoi)
IEEE Communications Letters , 2018
DOI
Security of cryptographic protocols based on coding theory
PhD Thesis - University of Rouen & University of Yaounde 1 , 2017
Full Text
Evolution of the McEliece Public Key Encryption Scheme
(with Vlad Dragoi and Dominic Bucerzan)
Innovative Security Solutions for Information Technology and Communications (SecITC 2017)
p. 129–149
Square Code Attack on a Modified Sidelnikov Cryptosystem
(with Ayoub Otmani)
Proceedings of Codes, Cryptology, and Information Security (C2SI 2015)
p. 173–183