The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jean-Charles Faugère: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Abdolali Basiri, Andreas Enge, Jean-Charles Faugère, Nicolas Gürel
    Implementing the Arithmetic of C3, 4Curves. [Citation Graph (0, 0)][DBLP]
    ANTS, 2004, pp:87-101 [Conf]
  2. Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita
    Comparison Between XL and Gröbner Basis Algorithms. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:338-353 [Conf]
  3. Jean-Charles Faugère, Antoine Joux
    Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:44-60 [Conf]
  4. Jean-Charles Faugère, Ludovic Perret
    Cryptanalysis of 2R- Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:357-372 [Conf]
  5. Jean-Charles Faugère, Ludovic Perret
    Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:30-47 [Conf]
  6. Abdolali Basiri, Jean-Charles Faugère
    Changing the ordering of Gröbner bases with LLL: case of two variables. [Citation Graph (0, 0)][DBLP]
    ISSAC, 2003, pp:23-29 [Conf]
  7. Frédéric Cazals, Jean-Charles Faugère, Marc Pouget, Fabrice Rouillier
    The implicit structure of ridges of a smooth parametric surface. [Citation Graph (0, 0)][DBLP]
    Computer Aided Geometric Design, 2006, v:23, n:7, pp:582-598 [Journal]
  8. Jean-Charles Faugère, Patrizia M. Gianni, Daniel Lazard, Teo Mora
    Efficient Computation of Zero-Dimensional Gröbner Bases by Change of Ordering. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 1993, v:16, n:4, pp:329-344 [Journal]
  9. Daniel Augot, Magali Bardet, Jean-Charles Faugère
    On formulas for decoding binary cyclic codes [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  10. Solving Structured Polynomial Systems and Applications to Cryptology. [Citation Graph (, )][DBLP]


  11. Security Analysis of Multivariate Polynomials for Hashing. [Citation Graph (, )][DBLP]


  12. Cryptanalysis of MinRank. [Citation Graph (, )][DBLP]


  13. Algebraic Cryptanalysis of McEliece Variants with Compact Keys. [Citation Graph (, )][DBLP]


  14. FGb: A Library for Computing Gröbner Bases. [Citation Graph (, )][DBLP]


  15. Classification of the perspective-three-point problem, discriminant variety and real solving polynomial systems of inequalities. [Citation Graph (, )][DBLP]


  16. Interactions between computer algebra (Gröbner bases) and cryptology. [Citation Graph (, )][DBLP]


  17. Solving systems of polynomial equations with symmetries using SAGBI-Gröbner bases. [Citation Graph (, )][DBLP]


  18. High order derivatives and decomposition of multivariate polynomials. [Citation Graph (, )][DBLP]


  19. Implicit Factoring with Shared Most Significant and Middle Bits. [Citation Graph (, )][DBLP]


  20. Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem. [Citation Graph (, )][DBLP]


  21. Cryptanalysis of the TRMS Signature Scheme of PKC'05. [Citation Graph (, )][DBLP]


  22. Cryptanalysis of the Hidden Matrix Cryptosystem. [Citation Graph (, )][DBLP]


  23. Computing modular correspondences for abelian varieties [Citation Graph (, )][DBLP]


  24. Gröbner Bases of Bihomogeneous Ideals generated by Polynomials of Bidegree (1,1): Algorithms and Complexity [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002