BibTeX records: Mohammed Meziani

download as .bib file

@article{DBLP:journals/aaecc/CayrelMNLS17,
  author       = {Pierre{-}Louis Cayrel and
                  Mohammed Meziani and
                  Ousmane Ndiaye and
                  Richard Lindner and
                  Rosemberg Silva},
  title        = {A pseudorandom number generator based on worst-case lattice problems},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {28},
  number       = {4},
  pages        = {283--294},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00200-017-0323-1},
  doi          = {10.1007/S00200-017-0323-1},
  timestamp    = {Fri, 28 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/CayrelMNLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Meziani14,
  author       = {Mohammed Meziani},
  title        = {Designing and improving code-based cryptosystems},
  school       = {Darmstadt University of Technology, Germany},
  year         = {2014},
  url          = {http://tuprints.ulb.tu-darmstadt.de/3972/},
  urn          = {urn:nbn:de:tuda-tuprints-39727},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Meziani14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/CayrelMNS14,
  author       = {Pierre{-}Louis Cayrel and
                  Mohammed Meziani and
                  Ousmane Ndiaye and
                  Quentin Santos},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Sihem Mesnager and
                  Erkay Savas},
  title        = {Efficient Software Implementations of Code-Based Hash Functions and
                  Stream-Ciphers},
  booktitle    = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI}
                  2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9061},
  pages        = {187--203},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16277-5\_11},
  doi          = {10.1007/978-3-319-16277-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/CayrelMNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CayrelM13,
  author       = {Pierre{-}Louis Cayrel and
                  Mohammed Meziani},
  title        = {Post-Quantum Cryptography: Code-based Signatures},
  journal      = {CoRR},
  volume       = {abs/1312.4265},
  year         = {2013},
  url          = {http://arxiv.org/abs/1312.4265},
  eprinttype    = {arXiv},
  eprint       = {1312.4265},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CayrelM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/NiebuhrMBB12,
  author       = {Robert Niebuhr and
                  Mohammed Meziani and
                  Stanislav Bulygin and
                  Johannes Buchmann},
  title        = {Selecting parameters for secure McEliece-based cryptosystems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {3},
  pages        = {137--147},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-011-0153-2},
  doi          = {10.1007/S10207-011-0153-2},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/NiebuhrMBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MezianiHC12,
  author       = {Mohammed Meziani and
                  Gerhard Hoffmann and
                  Pierre{-}Louis Cayrel},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Improving the Performance of the {SYND} Stream Cipher},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {99--116},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_7},
  doi          = {10.1007/978-3-642-31410-0\_7},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/MezianiHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MezianiB12,
  author       = {Mohammed Meziani and
                  Rachid El Bansarkhani},
  editor       = {Roberto Di Pietro and
                  Javier Herranz and
                  Ernesto Damiani and
                  Radu State},
  title        = {An Efficient and Secure Coding-Based Authenticated Encryption Scheme},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security, 7th International
                  Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012,
                  Pisa, Italy, September 13-14, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7731},
  pages        = {43--60},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35890-6\_4},
  doi          = {10.1007/978-3-642-35890-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MezianiB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BansarkhaniM12,
  author       = {Rachid El Bansarkhani and
                  Mohammed Meziani},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {An Efficient Lattice-Based Secret Sharing Construction},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {160--168},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_14},
  doi          = {10.1007/978-3-642-30955-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BansarkhaniM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/CayrelAHMN11,
  author       = {Pierre{-}Louis Cayrel and
                  Sidi Mohamed El Yousfi Alaoui and
                  Gerhard Hoffmann and
                  Mohammed Meziani and
                  Robert Niebuhr},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Rosslin John Robles and
                  Maricel O. Balitanas},
  title        = {Recent Progress in Code-Based Cryptography},
  booktitle    = {Information Security and Assurance - International Conference, {ISA}
                  2011, Brno, Czech Republic, August 15-17, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {200},
  pages        = {21--32},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23141-4\_3},
  doi          = {10.1007/978-3-642-23141-4\_3},
  timestamp    = {Wed, 24 May 2017 08:30:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/CayrelAHMN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/MezianiCA11,
  author       = {Mohammed Meziani and
                  Pierre{-}Louis Cayrel and
                  Sidi Mohamed El Yousfi Alaoui},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Rosslin John Robles and
                  Maricel O. Balitanas},
  title        = {2SC: An Efficient Code-Based Stream Cipher},
  booktitle    = {Information Security and Assurance - International Conference, {ISA}
                  2011, Brno, Czech Republic, August 15-17, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {200},
  pages        = {111--122},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23141-4\_11},
  doi          = {10.1007/978-3-642-23141-4\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/MezianiCA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/MezianiDCA11,
  author       = {Mohammed Meziani and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Pierre{-}Louis Cayrel and
                  Sidi Mohamed El Yousfi Alaoui},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Rosslin John Robles and
                  Maricel O. Balitanas},
  title        = {{S-FSB:} An Improved Variant of the {FSB} Hash Family},
  booktitle    = {Information Security and Assurance - International Conference, {ISA}
                  2011, Brno, Czech Republic, August 15-17, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {200},
  pages        = {132--145},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23141-4\_13},
  doi          = {10.1007/978-3-642-23141-4\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/MezianiDCA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/AlaouiCM11,
  author       = {Sidi Mohamed El Yousfi Alaoui and
                  Pierre{-}Louis Cayrel and
                  Mohammed Meziani},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Rosslin John Robles and
                  Maricel O. Balitanas},
  title        = {Improved Identity-Based Identification and Signature Schemes Using
                  Quasi-Dyadic Goppa Codes},
  booktitle    = {Information Security and Assurance - International Conference, {ISA}
                  2011, Brno, Czech Republic, August 15-17, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {200},
  pages        = {146--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23141-4\_14},
  doi          = {10.1007/978-3-642-23141-4\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/AlaouiCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/CayrelM10,
  author       = {Pierre{-}Louis Cayrel and
                  Mohammed Meziani},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli},
  title        = {Post-quantum Cryptography: Code-Based Signatures},
  booktitle    = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN}
                  2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6059},
  pages        = {82--99},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13577-4\_8},
  doi          = {10.1007/978-3-642-13577-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/CayrelM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NiebuhrMBB10,
  author       = {Robert Niebuhr and
                  Mohammed Meziani and
                  Stanislav Bulygin and
                  Johannes Buchmann},
  title        = {Selecting Parameters for Secure McEliece-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/271},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NiebuhrMBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics