-
Horlemann-Trautmann A.-L., Marshall K., Rosenthal J., “Extension of Overbeck'S Attack For Gabidulin-Based Cryptosystems”, Designs Codes Cryptogr., 86:2, SI (2018), 319–340
-
Lau Terry Shue Chien, Tan Ch.H., “Key Recovery Attack on Mcnie Based on Low Rank Parity Check Codes and Its Reparation”, Advances in Information and Computer Security, Iwsec 2018, Lecture Notes in Computer Science, 11049, eds. Inomata A., Yasuda K., Springer International Publishing Ag, 2018, 19–34
-
Kim J.-L., Galvez L., Kim Y.-S., Lee N., “A New Lrpc-Kronecker Product Codes Based Public-Key Cryptography”, Apkc'18: Proceedings of the 5Th Acm Asia Public-Key Cryptography Workshop, Assoc Computing Machinery, 2018, 25–33
-
Martinez-Penas U., Kschischang F.R., “Reliable and Secure Multishot Network Coding Using Linearized Reed-Solomon Codes”, 2018 56Th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Annual Allerton Conference on Communication Control and Computing, IEEE, 2018, 702–709
-
Aragon N., Gaborit Ph., Hauteville A., Tillich J.-P., “A New Algorithm For Solving the Rank Syndrome Decoding Problem”, 2018 IEEE International Symposium on Information Theory (Isit), IEEE International Symposium on Information Theory, IEEE, 2018, 2421–2425
-
Martinez-Penas U., “Skew and Linearized Reed-Solomon Codes and Maximum Sum Rank Distance Codes Over Any Division Ring”, J. Algebra, 504 (2018), 587–612
-
Pilipchuk N.I., “Cardinality of Subspace Multicomponent Codes”, 2017 Fourth International Conference on Engineering and Telecommunication (En&T), ed. Pavlyukova E. Uzhinskaya L. Suroegina Z., IEEE, 2017, 11–14
-
Puchinger S., Nielsen Johan Rosenkilde Ne, Li W., Sidorenko V., “Row Reduction Applied to Decoding of Rank-Metric and Subspace Codes”, Designs Codes Cryptogr., 82:1-2, SI (2017), 389–409
-
Э. М. Габидулин, Н. И. Пилипчук, “Многокомпонентные коды с максимальным кодовым расстоянием”, Пробл. передачи информ., 52:3 (2016), 84–91
; E. M. Gabidulin, N. I. Pilipchuk, “Multicomponent codes with maximum code distance”, Problems Inform. Transmission, 52:3 (2016), 276–283
-
О. В. Трушина, Э. М. Габидулин, “Новый метод обеспечения анонимности и секретности в сетевом кодировании”, Пробл. передачи информ., 51:1 (2015), 82–89
; O. V. Trushina, E. M. Gabidulin, “A new method for ensuring anonymity and security in network coding”, Problems Inform. Transmission, 51:1 (2015), 75–81
-
Gaborit Ph., Ruatta O., Schrek J., Zemor G., “Ranksign: An Efficient Signature Algorithm Based on the Rank Metric”, Post-Quantum Cryptography, Pqcrypto 2014, Lecture Notes in Computer Science, 8772, ed. Mosca M., Springer-Verlag Berlin, 2014, 88–107
-
Gaborit Ph., Ruatta O., Schrek J., Zemor G., “New Results For Rank-Based Cryptography”, Progress in Cryptology - Africacrypt 2014, Lecture Notes in Computer Science, 8469, eds. Pointcheval D., Vergnaud D., Springer-Verlag Berlin, 2014, 1–12
-
Э. М. Габидулин, Н. И. Пилипчук, “Ранговые подкоды в многокомпонентном сетевом кодировании”, Пробл. передачи информ., 49:1 (2013), 46–60
; E. M. Gabidulin, N. I. Pilipchuk, “Rank subcodes in multicomponent network coding”, Problems Inform. Transmission, 49:1 (2013), 40–53
-
Э. М. Габидулин, Н. И. Пилипчук, Б. Хонари, Х. Рашван, “Защита информации в сети со случайным сетевым кодированием”, Пробл. передачи информ., 49:2 (2013), 92–106
; E. M. Gabidulin, N. I. Pilipchuk, B. Honary, H. Rashwan, “Information security in a random network coding network”, Problems Inform. Transmission, 49:2 (2013), 179–191
-
Yang Sh., Honold T., “Good Random Matrices Over Finite Fields”, Adv. Math. Commun., 6:2 (2012), 203–227
-
Tan V.Y.F., Balzano L., Draper S.C., “Rank Minimization Over Finite Fields: Fundamental Limits and Coding-Theoretic Interpretations”, IEEE Trans. Inf. Theory, 58:4 (2012), 2018–2039
-
А. Вахтер, В. Р. Сидоренко, М. Боссерт, В. В. Зяблов, “Коды с (частично) единичной памятью на основе кодов Габидулина”, Пробл. передачи информ., 47:2 (2011), 38–51
; A. Wachter, V. R. Sidorenko, M. Bossert, V. V. Zyablov, “On (partial) unit memory codes based on Gabidulin codes”, Problems Inform. Transmission, 47:2 (2011), 117–129
-
Б. А. Погорелов, М. А. Пудовкина, “Натуральные метрики и их свойства. Ч. 1. Подметрики и надметрики”, Матем. вопр. криптогр., 2:4 (2011), 49–74
-
Sidorenko V., Richter G., Bossert M., “Linearized Shift-Register Synthesis”, IEEE Trans Inform Theory, 57:9 (2011), 6025–6032
-
Rashwan H., Gabidulin E.M., Honary B., “Security of the GPT cryptosystem and its applications to cryptography”, Security and Communication Networks, 4:8 (2011), 937–946