Valérie Gauthier-Umaña
Valérie Gauthier-Umaña
Universidad del Rosario, Facultad de Ciencias Naturales y Matemáticas, GI Matemáticas Aplicadas y
Verified email at urosario.edu.co - Homepage
TitleCited byYear
A distinguisher for high-rate McEliece cryptosystems
JC Faugere, V Gauthier-Umana, A Otmani, L Perret, JP Tillich
IEEE Transactions on Information Theory 59 (10), 6830-6844, 2013
1612013
A distinguisher for high rate McEliece cryptosystems
JC Faugère, V Gauthier-Umaña, A Otmani, L Perret, JP Tillich
IEEE Information Theory Workshop, ITW 2011, 282-286, 2011
1612011
Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes
A Couvreur, P Gaborit, V Gauthier-Umaña, A Otmani, JP Tillich
Designs, Codes and Cryptography 73 (2), 641-666, 2014
592014
Practical key recovery attacks on two McEliece variants
VG Umana, G Leander
Proceedings of the Second International Conference on Symbolic Computation …, 2010
522010
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
A Couvreur, P Gaborit, V Gauthier-Umaña, A Otmani, JP Tillich
arXiv preprint arXiv:1307.6458, 2013
222013
A polynomial-time attack on the BBCRS scheme
A Couvreur, A Otmani, JP Tillich, V Gauthier–Umana
IACR International Workshop on Public Key Cryptography, 175-193, 2015
212015
Practical key recovery attacks on two McEliece variants (2009)
VG Umana, G Leander
URL: http://eprint. iacr. org/2009/509. Citations in this document 6, 0
8
Post-Quantum Cryptography
VG Umana
Post-Quantum Cryptography, 2011
42011
Modelos epidemiológicos en redes: una presentación introductoria
CEÁ Cabrera, EJA Lotero, VG Umaña
Boletín de Matemáticas 22 (1), 21-37, 0
2*
Dual toric codes and polytopes of degree one
VG Uman͂a, M Velasco
SIAM Journal on Discrete Mathematics 29 (1), 683-692, 2015
12015
Post-Quantum Cryptography: Code-based Cryptography and Hash Based Signatures Schemes
VG Umaa
Scholar's Press, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–11