Daniel Augot : Publications
Cryptologie
- Daniel Augot, Matthieu Finiasz. A Public Key Encryption
Scheme Based on the Polynomial Reconstruction Problem.
Advances in Cryptology - EUROCRYT 2003. Postscript, PDF.
- Daniel Augot, Matthieu Finiasz, Nicolas Sendrier. A
Family of Fast Syndrome Based Cryptographic Hash
Functions. Progress in Cryptology - Mycrypt 2005. Postscript, PDF.
- Raghav Bhaskar, Daniel Augot, Valerie Issarny, Daniele
Sacchetti. An Efficient Group Key Agreement Protocol for
Ad hoc Networks. IEEE Workshop on Trust, Security and
Privacy in Ubiquitous Computing, Taormina, Italy. Postscript, PDF.
Décodage
- Daniel Augot, Lancelot Pecquet. A Hensel Lifting to
Replace Factorization in List-Decoding of Algebraic-Geometric
and Reed-Solomon.
IEEE Transactions on Information Theory, vol. 46, n. 7,
2000. Resarch report here
with bogus statements. Final version (Postscript,PDF).
- Daniel Augot. A parallel version of a special case of the
Sudan decoding algorithm Proc. IEEE International
Symposium on Information Theory 2002 (ISIT), Lausanne,
Switzerland, June 30 - July 5. Postscript, PDF
- D. Augot, M. Bardet, J-C. Faugère. Efficient decoding of
(binary) cyclic codes above the correction capacity of the
code using Gröbner bases, Proc. IEEE International
Symposium on Information Theory 2003 (ISIT), Yokohama, Japan,
June 29 - July 4. Postscript, PDF.
- D. Augot, M. El-Khamy, R. J. McEliece, F. Parvaresh, M. Stepanov, A. Vardy. List Decoding of Reed-Solomon product codes, Proc. of the Tenth International Workshop on Algebraic and Combinatorial Coding Theory, Zvenigorod, Russia, 3 September - 9 September 2006. Postscript, PDF.
- D. Augot, M. Bardet, J-C. Faugère. On formulas for decoding binary cyclic codes, Proc. IEEE International
Symposium on Information Theory 2007 (ISIT), Nice, France,
June 24-29. Extended abstract.
- D. Augot, M. Bardet, J-C. Faugère. On the decoding of cyclic codes with the Newton's
identities, Journal of Symbolic Computation, accepted for publication, 28 pages, 2008. Special Issue on
Gröbner Bases Techniques in Cryptography and Coding Theory. Postscript, PDF.
-
Bases normales
- D. Augot, P. Camion. On the computation of minimal
polynomials, cyclic vectors and Frobenius Forms. Linear
Algebra and Its Applications 260:61-94 (1997).
Postscript, pdf.
- D. Augot, P. Camion. Forme de Frobenius et vecteurs
cycliques. Comptes Rendus de l'Académie des Sciences, Paris,
t. 318, Série I, p. 183-188, 1994. Postscript, pdf (En Français).
Bases de Groebner et codes cycliques
- D. Augot, P. Charpin, N. Sendrier. Studying the locator
polynomials of minimum weight codewords of BCH codes. IEEE
Transactions on Information Theory, Vol. IT 38, No 3, p. 960-973,
May 1992. Postscript, PDF
- D. Augot, N. Sendrier. Idempotents and the BCH bound. IEEE
Transactions on Information Theory, Vol. IT 40, No 1, p. 204-207,
January 1994.Postscript.
- D. Augot, Françoise Lévy-Dit-Véhel. Bounds on the minimum distance
of duals of BCH codes. EEE Transactions on Information Theory,
vol IT 42, n04, pp.1257-1260, Juillet 1996 (correspondence).
Postscript.
- D. Augot. Description of minimum weight codewords of cyclic
by algebraic systems. Finite Fields and their Applications 2,
138-152 (1996). Postscript.
- D. Augot, N. Sendrier, P. Charpin. Sur une classe de polynômes
scindés de l'algèbre F2^m[Z].
Comptes Rendus de l'Académie des Sciences, Paris, t. 312, Série I,
pages 649-651, 1991. Postscript.
(En Français)
- D. Augot, P. Charpin, N. Sendrier. The minimum distance of
some binary codes via the Newton's Identities. Eurocodes'90, LNCS
514, p 65-73, Springer-Verlag.
Postscript
Watermarking
- D. Augot, J.M. Boucqueau, J.-F. Delaigle, C. Fontaine,
E. Goray. Secure Delivery of Images over Open
Networks, Proceedings of the IEEE, special issue on
"Identification and protection of multimedia information",
invited paper, Volume 87, Number 7, pp 1251-1266 (July
1999). PDF.
- D. Augot, C. Fontaine. Key Issues for watermarking digital
images, International Symposium on Electronic Image
Capture and Publishing 98. Proceedings of the SPIE,
Vol. 3409, pp 176-185 (1998). PDF.
- D. Augot, J.-F. Delaigle, C. Fontaine. DHWM: a scheme for
managing watermarking keys in the Aquarelle multimedia
distributed system, Computer Security - ESORICS 98,
Lecture Notes in Computer Science 1485, pp 241-255,
Springer-Verlag (1998). PDF.
Last modification : September, 30 2005