Error-correcting codes are used to reconstitute digital data, which are proned to alterations during their storage and their transport. They can also be employed in cryptography as a tool to encrypt data and authenticate people. These different aspects are treated in this document. First of all, we study the class of cyclic codes defined by the zero set {1, 2^i+1, 2^j+1}, where i and j are distinct positive integers. We focus on the characterization of three-error correcting codes in this class as well as the weight distribution of these codes. We improve the Schaub algorithm, which gives a lower bound on the minimum distance of cyclic codes. We implement this algorithm to compute the spectral immunity of Boolean functions. This quantity is...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
In this thesis, we study the Reed-Muller codes which constitute one of the classes of error correcti...
Dans cette thèse nous nous intéressons à la cryptographie utilisant des codes correcteurs. Cette pro...
We consider a class of 3-error-correcting cyclic codes of length 2^m −1 over the two-element field F...
Le premier protocole cryptographique basé sur les codes correcteurs d'erreurs a été proposé en 1978 ...
Error correcting codes has become an integral part of the design of reliable data transmissions and ...
Abstract McEliece proposed the first public-key cryptosystem based on linear error-correcting codes....
This thesis is about algorithmic problems arising when someone wants to imple-ment a cryptosystem ba...
McEliece cryptosystem is the first public-key cryptosystem based on linear error-correcting codes. A...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
This thesis studies some aspects of error-correcting codes and their applications to information sec...
I discuss the decoding problem of two important families of algebraiccodes: binary cyclic codes and ...
Code-based cryptography is one of the fields allowing to build post-quantum cryptosystems, i.e secur...
La cryptographie à base de codes correcteurs, introduite par Robert McEliece en 1978, est un candida...
In this thesis we study code-based cryptography. By this term we mean the crypto-systems whose secur...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
In this thesis, we study the Reed-Muller codes which constitute one of the classes of error correcti...
Dans cette thèse nous nous intéressons à la cryptographie utilisant des codes correcteurs. Cette pro...
We consider a class of 3-error-correcting cyclic codes of length 2^m −1 over the two-element field F...
Le premier protocole cryptographique basé sur les codes correcteurs d'erreurs a été proposé en 1978 ...
Error correcting codes has become an integral part of the design of reliable data transmissions and ...
Abstract McEliece proposed the first public-key cryptosystem based on linear error-correcting codes....
This thesis is about algorithmic problems arising when someone wants to imple-ment a cryptosystem ba...
McEliece cryptosystem is the first public-key cryptosystem based on linear error-correcting codes. A...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
This thesis studies some aspects of error-correcting codes and their applications to information sec...
I discuss the decoding problem of two important families of algebraiccodes: binary cyclic codes and ...
Code-based cryptography is one of the fields allowing to build post-quantum cryptosystems, i.e secur...
La cryptographie à base de codes correcteurs, introduite par Robert McEliece en 1978, est un candida...
In this thesis we study code-based cryptography. By this term we mean the crypto-systems whose secur...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
In this thesis, we study the Reed-Muller codes which constitute one of the classes of error correcti...
Dans cette thèse nous nous intéressons à la cryptographie utilisant des codes correcteurs. Cette pro...