default search action
Gilles Macario-Rat
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Benoît Cogliati, Gilles Macario-Rat, Jacques Patarin, Pierre Varjabedian:
State of the Art of HFE Variants - Is It Possible to Repair HFE with Appropriate Modifiers? PQCrypto (2) 2024: 144-167 - 2023
- [c13]Chrystel Gaber, Gilles Macario-Rat, Simona David, Jean-Philippe Wary, Alain Cuaboz:
Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy. MSPN 2023: 71-74 - [i14]Gilles Macario-Rat, Jacques Patarin, Benoit Cogliati, Jean-Charles Faugère, Pierre-Alain Fouque, Louis Goubin, Robin Larrieu, Brice Minaud:
Rectangular Attack on VOX. IACR Cryptol. ePrint Arch. 2023: 1822 (2023) - 2022
- [i13]Jean-Charles Faugère, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV. IACR Cryptol. ePrint Arch. 2022: 203 (2022) - 2021
- [i12]Gilles Macario-Rat, Jacques Patarin:
Ariadne Thread and Salt: New Multivariate Cryptographic Schemes with Public Keys in Degree 3. IACR Cryptol. ePrint Arch. 2021: 84 (2021) - [i11]Gilles Macario-Rat, Jacques Patarin:
UOV-Pepper: New Public Key Short Signature in Degree 3. IACR Cryptol. ePrint Arch. 2021: 1006 (2021) - [i10]Gilles Macario-Rat, Jacques Patarin:
Onyx: New Encryption and Signature Schemes with Multivariate Public Key in Degree 3. IACR Cryptol. ePrint Arch. 2021: 1070 (2021) - 2020
- [c12]Sandra Rasoamiaramanana, Marine Minier, Gilles Macario-Rat:
A White-Box Encryption Scheme using Physically Unclonable Functions. ICETE (2) 2020: 279-286 - [i9]Jacques Patarin, Gilles Macario-Rat, Maxime Bros, Eliane Koussa:
Ultra-Short Multivariate Public Key Signatures. IACR Cryptol. ePrint Arch. 2020: 914 (2020)
2010 – 2019
- 2019
- [c11]Ward Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
PKP-Based Signature Scheme. INDOCRYPT 2019: 3-22 - [c10]Sandra Rasoamiaramanana, Gilles Macario-Rat, Marine Minier:
White-Box Traitor-Tracing from Tardos Probabilistic Codes. SECITC 2019: 125-141 - [i8]Eliane Koussa, Gilles Macario-Rat, Jacques Patarin:
On the complexity of the Permuted Kernel Problem. IACR Cryptol. ePrint Arch. 2019: 412 (2019) - 2018
- [c9]Gilles Macario-Rat, Jacques Patarin:
Two-Face: New Public Key Multivariate Schemes. AFRICACRYPT 2018: 252-265 - [c8]Eliane Koussa, Jean-Charles Faugère, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
Combinatorial Digital Signature Scheme. BDCSIntell 2018: 48-54 - [i7]Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
PKP-Based Signature Scheme. IACR Cryptol. ePrint Arch. 2018: 714 (2018) - 2017
- [i6]Gilles Macario-Rat, Jacques Patarin:
Two-Face: New Public Key Multivariate Schemes. IACR Cryptol. ePrint Arch. 2017: 1210 (2017) - 2016
- [c7]Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Cristina Onete, Benjamin Richard:
A Cryptographic Analysis of UMTS/LTE AKA. ACNS 2016: 18-35 - [c6]Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi:
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. CT-RSA 2016: 236-252 - [i5]Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi:
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. IACR Cryptol. ePrint Arch. 2016: 231 (2016) - [i4]Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Benjamin Richard, Cristina Onete:
A Cryptographic Analysis of UMTS/LTE AKA. IACR Cryptol. ePrint Arch. 2016: 371 (2016) - 2014
- [i3]Jérôme Plût, Pierre-Alain Fouque, Gilles Macario-Rat:
Solving the "Isomorphism of Polynomials with Two Secrets" Problem for all Pairs of Quadratic Forms. CoRR abs/1406.3163 (2014) - 2013
- [c5]Gilles Macario-Rat, Jérôme Plût, Henri Gilbert:
New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography. ASIACRYPT (1) 2013: 117-133 - [i2]Gilles Macario-Rat, Jérôme Plût, Henri Gilbert:
New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography. IACR Cryptol. ePrint Arch. 2013: 799 (2013) - 2011
- [c4]Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat:
Practical Key-Recovery for All Possible Parameters of SFLASH. ASIACRYPT 2011: 667-685 - [i1]Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat:
Practical Key-recovery For All Possible Parameters of SFLASH. IACR Cryptol. ePrint Arch. 2011: 271 (2011)
2000 – 2009
- 2009
- [c3]Olivier Billet, Gilles Macario-Rat:
Cryptanalysis of the Square Cryptosystems. ASIACRYPT 2009: 451-468 - 2008
- [c2]Pierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern:
Key Recovery on Hidden Monomial Multivariate Schemes. EUROCRYPT 2008: 19-30 - [c1]Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern:
Total Break of the l-IC Signature Scheme. Public Key Cryptography 2008: 1-17
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-11 00:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint