This thesis investigates the problem of reverse-engineering a classical transmission scheme from an eavesdropped noisy communication. The two main parts of this work are successively focus on the reconstruction of the two main elements in the scheme: the scrambler and the error correcting code, in the order they have to be treated by an attacker, i.e. in the reverse order to that in which they appear in the transmission scheme. The first part deals with the reconstruction of a binary linear codefrom the knowledge of noisy codewords. First, we present and analyse an algorithm due to A. Valembois. The analysis leads us to a new statistical test for finding words that may belong to the dual of the error correcting code used during the transmis...
International audienceIn this paper we present a generic approach for the problem of the blind estim...
The existing algorithm for reconstruction of the feedback polynomial in a linear scrambler relies o...
This thesis deals with the cryptanalysis of a simple but important stream cipher: the filter generat...
This thesis investigates the problem of reverse-engineering a classical transmission scheme from an ...
In this paper, the problem of reconstruction of the feedback polynomial in a linear scrambler is stu...
In this paper, the reconstruction of the feedback polynomial as well as the initial state of a linea...
In this thesis, I am interested in the recognition of error correcting codes from a noisy observatio...
CETTE THESE TRAITE LE PROBLEME DE LA RECONSTRUCTION EN CRYPTOLOGIE ET EN THEORIE DES CODES : EN UTIL...
Dans cette thèse, nous nous intéressons au problème de la reconnaissance de code. Ce problème se pro...
We focus on the problem of recovering the length and synchronization of a linear block code from an ...
This article deals with the problem of quantifying how many noisy codewords have to be eavesdropped ...
This work focus on erasure codes, particularly those that of high performance, and the related decod...
The problem of identifying the channel code from a received sequence of noise-affected codewords is ...
In this thesis, we study communication channels in a non cooperative context and more particularly, ...
In this paper we present a generic approach for the problem of the blind estimation of the parameter...
International audienceIn this paper we present a generic approach for the problem of the blind estim...
The existing algorithm for reconstruction of the feedback polynomial in a linear scrambler relies o...
This thesis deals with the cryptanalysis of a simple but important stream cipher: the filter generat...
This thesis investigates the problem of reverse-engineering a classical transmission scheme from an ...
In this paper, the problem of reconstruction of the feedback polynomial in a linear scrambler is stu...
In this paper, the reconstruction of the feedback polynomial as well as the initial state of a linea...
In this thesis, I am interested in the recognition of error correcting codes from a noisy observatio...
CETTE THESE TRAITE LE PROBLEME DE LA RECONSTRUCTION EN CRYPTOLOGIE ET EN THEORIE DES CODES : EN UTIL...
Dans cette thèse, nous nous intéressons au problème de la reconnaissance de code. Ce problème se pro...
We focus on the problem of recovering the length and synchronization of a linear block code from an ...
This article deals with the problem of quantifying how many noisy codewords have to be eavesdropped ...
This work focus on erasure codes, particularly those that of high performance, and the related decod...
The problem of identifying the channel code from a received sequence of noise-affected codewords is ...
In this thesis, we study communication channels in a non cooperative context and more particularly, ...
In this paper we present a generic approach for the problem of the blind estimation of the parameter...
International audienceIn this paper we present a generic approach for the problem of the blind estim...
The existing algorithm for reconstruction of the feedback polynomial in a linear scrambler relies o...
This thesis deals with the cryptanalysis of a simple but important stream cipher: the filter generat...