DAGS: Key encapsulation using dyadic GS codes
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum
Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation …
Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation …
Generalization of BJMM-ISD using May-Ozerov nearest neighbor algorithm over an arbitrary finite field
CT Gueye, JB Klamti, S Hirose - International conference on codes …, 2017 - Springer
The security of McEliece cryptosystem heavily relies on the hardness of decoding a random
linear code. The best known generic decoding algorithms are derived from the Information-…
linear code. The best known generic decoding algorithms are derived from the Information-…
[PDF][PDF] DAGS: Key encapsulation for dyadic GS codes
… Gustavo Banegas1, Paulo SLM Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert
Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti …
Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti …
A NP-complete problem in coding theory with application to code based cryptography
TP Berger, CT Gueye, JB Klamti - International Conference on Codes …, 2017 - Springer
It is easy to determine if a given code $$\mathcal {C}$$ is a subcode of another known code
$$\mathcal {D}$$ . For most of occurrences, it is easy to determine if two codes $$\mathcal {…
$$\mathcal {D}$$ . For most of occurrences, it is easy to determine if two codes $$\mathcal {…
Secure cryptographic scheme based on modified Reed Muller codes
CT Gueye, ELHM Mboup - International Journal of Security and Its …, 2013 - earticle.net
It is devised a new cryptosystem based on modified Reed Muller codes RM(r,m). The new
cryptosystem is a modified version of Sidel'nikov's one. This allows to increase the security of …
cryptosystem is a modified version of Sidel'nikov's one. This allows to increase the security of …
Generalized subspace subcodes with application in cryptology
TP Berger, CT Gueye, JB Klamti - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… CT Gueye and JB Klamti were supported in part by CEA-MITIC for CBC Project and in part
by the Government of Senegal’s Ministry of Higher Education and Research for ISPQ Project. …
by the Government of Senegal’s Ministry of Higher Education and Research for ISPQ Project. …
Dags: Reloaded revisiting dyadic key encapsulation
In this paper we revisit some of the main aspects of the DAGS Key Encapsulation Mechanism,
one of the code-based candidates to NIST’s standardization call for the key exchange/…
one of the code-based candidates to NIST’s standardization call for the key exchange/…
Designing a public key cryptosystem based on quasi-cyclic subspace subcodes of Reed-Solomon codes
In this paper we introduce a code-based cryptosystem using quasi-cyclic generalized subspace
subcodes of Generalized Reed-Solomon codes in order to reduce the public key size. In …
subcodes of Generalized Reed-Solomon codes in order to reduce the public key size. In …
NP-completeness of the Goppa parameterised random binary quasi-dyadic syndrome decoding problem
…, MK Diagne, CT Gueye - International Journal of …, 2017 - inderscienceonline.com
… Cheikh Thiécoumba Gueye received his PhD in Mathematics in Mars 1998 at University
Cheikh Anta Diop of Dakar, Senegal. He is a Permanent Professor at University …
Cheikh Anta Diop of Dakar, Senegal. He is a Permanent Professor at University …
Efficient implementation of hybrid encryption from coding theory
In this work we present an efficient implementation of the Hybrid Encryption scheme based
on the Niederreiter PCKS proposed by E. Persichetti. To achieve IND-CCA2 security (in the …
on the Niederreiter PCKS proposed by E. Persichetti. To achieve IND-CCA2 security (in the …