Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mohammed Meziani
@article{DBLP:journals/aaecc/CayrelMNLS17, author = {Pierre{-}Louis Cayrel and Mohammed Meziani and Ousmane Ndiaye and Richard Lindner and Rosemberg Silva}, title = {A pseudorandom number generator based on worst-case lattice problems}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {28}, number = {4}, pages = {283--294}, year = {2017}, url = {https://doi.org/10.1007/s00200-017-0323-1}, doi = {10.1007/S00200-017-0323-1}, timestamp = {Fri, 28 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/CayrelMNLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Meziani14, author = {Mohammed Meziani}, title = {Designing and improving code-based cryptosystems}, school = {Darmstadt University of Technology, Germany}, year = {2014}, url = {http://tuprints.ulb.tu-darmstadt.de/3972/}, urn = {urn:nbn:de:tuda-tuprints-39727}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Meziani14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/CayrelMNS14, author = {Pierre{-}Louis Cayrel and Mohammed Meziani and Ousmane Ndiaye and Quentin Santos}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Sihem Mesnager and Erkay Savas}, title = {Efficient Software Implementations of Code-Based Hash Functions and Stream-Ciphers}, booktitle = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI} 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9061}, pages = {187--203}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16277-5\_11}, doi = {10.1007/978-3-319-16277-5\_11}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/waifi/CayrelMNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CayrelM13, author = {Pierre{-}Louis Cayrel and Mohammed Meziani}, title = {Post-Quantum Cryptography: Code-based Signatures}, journal = {CoRR}, volume = {abs/1312.4265}, year = {2013}, url = {http://arxiv.org/abs/1312.4265}, eprinttype = {arXiv}, eprint = {1312.4265}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CayrelM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/NiebuhrMBB12, author = {Robert Niebuhr and Mohammed Meziani and Stanislav Bulygin and Johannes Buchmann}, title = {Selecting parameters for secure McEliece-based cryptosystems}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {3}, pages = {137--147}, year = {2012}, url = {https://doi.org/10.1007/s10207-011-0153-2}, doi = {10.1007/S10207-011-0153-2}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/NiebuhrMBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/MezianiHC12, author = {Mohammed Meziani and Gerhard Hoffmann and Pierre{-}Louis Cayrel}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Improving the Performance of the {SYND} Stream Cipher}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {99--116}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_7}, doi = {10.1007/978-3-642-31410-0\_7}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/MezianiHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MezianiB12, author = {Mohammed Meziani and Rachid El Bansarkhani}, editor = {Roberto Di Pietro and Javier Herranz and Ernesto Damiani and Radu State}, title = {An Efficient and Secure Coding-Based Authenticated Encryption Scheme}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7731}, pages = {43--60}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35890-6\_4}, doi = {10.1007/978-3-642-35890-6\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MezianiB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BansarkhaniM12, author = {Rachid El Bansarkhani and Mohammed Meziani}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {An Efficient Lattice-Based Secret Sharing Construction}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {160--168}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_14}, doi = {10.1007/978-3-642-30955-7\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BansarkhaniM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/CayrelAHMN11, author = {Pierre{-}Louis Cayrel and Sidi Mohamed El Yousfi Alaoui and Gerhard Hoffmann and Mohammed Meziani and Robert Niebuhr}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Rosslin John Robles and Maricel O. Balitanas}, title = {Recent Progress in Code-Based Cryptography}, booktitle = {Information Security and Assurance - International Conference, {ISA} 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {200}, pages = {21--32}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23141-4\_3}, doi = {10.1007/978-3-642-23141-4\_3}, timestamp = {Wed, 24 May 2017 08:30:52 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/CayrelAHMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/MezianiCA11, author = {Mohammed Meziani and Pierre{-}Louis Cayrel and Sidi Mohamed El Yousfi Alaoui}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Rosslin John Robles and Maricel O. Balitanas}, title = {2SC: An Efficient Code-Based Stream Cipher}, booktitle = {Information Security and Assurance - International Conference, {ISA} 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {200}, pages = {111--122}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23141-4\_11}, doi = {10.1007/978-3-642-23141-4\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/MezianiCA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/MezianiDCA11, author = {Mohammed Meziani and {\"{O}}zg{\"{u}}r Dagdelen and Pierre{-}Louis Cayrel and Sidi Mohamed El Yousfi Alaoui}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Rosslin John Robles and Maricel O. Balitanas}, title = {{S-FSB:} An Improved Variant of the {FSB} Hash Family}, booktitle = {Information Security and Assurance - International Conference, {ISA} 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {200}, pages = {132--145}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23141-4\_13}, doi = {10.1007/978-3-642-23141-4\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/MezianiDCA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/AlaouiCM11, author = {Sidi Mohamed El Yousfi Alaoui and Pierre{-}Louis Cayrel and Mohammed Meziani}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Rosslin John Robles and Maricel O. Balitanas}, title = {Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes}, booktitle = {Information Security and Assurance - International Conference, {ISA} 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {200}, pages = {146--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23141-4\_14}, doi = {10.1007/978-3-642-23141-4\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/AlaouiCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/CayrelM10, author = {Pierre{-}Louis Cayrel and Mohammed Meziani}, editor = {Tai{-}Hoon Kim and Hojjat Adeli}, title = {Post-quantum Cryptography: Code-Based Signatures}, booktitle = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN} 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6059}, pages = {82--99}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13577-4\_8}, doi = {10.1007/978-3-642-13577-4\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/CayrelM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NiebuhrMBB10, author = {Robert Niebuhr and Mohammed Meziani and Stanislav Bulygin and Johannes Buchmann}, title = {Selecting Parameters for Secure McEliece-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2010}, url = {http://eprint.iacr.org/2010/271}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NiebuhrMBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.