


default search action
Vlad Dragoi
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j14]Vlad-Florin Dragoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso:
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(1): 367-391 (2025) - 2024
- [j13]Vlad-Florin Dragoi
, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer syndrome decoding in the presence of noise. Cryptogr. Commun. 16(5): 1103-1134 (2024) - [j12]Vlad-Florin Dragoi
, Mohammad Rowshan
, Jinhong Yuan
:
On the Closed-Form Weight Enumeration of Polar Codes: 1.5d -Weight Codewords. IEEE Trans. Commun. 72(10): 5972-5987 (2024) - [j11]Vlad-Florin Dragoi
, Valeriu Beiu
:
Which Coefficients Matter Most - Consecutive $k$-Out-of-$n$:$F$ Systems Revisited. IEEE Trans. Reliab. 73(3): 1633-1646 (2024) - [c19]Mohammad Rowshan, Vlad-Florin Dragoi, Jinhong Yuan:
Weight Structure of Low/High-Rate Polar Codes and Its Applications. ISIT 2024: 2945-2950 - [i19]Mohammad Rowshan
, Vlad-Florin Dragoi, Jinhong Yuan:
Weight Structure of Low/High-Rate Polar Codes and Its Applications. CoRR abs/2402.12707 (2024) - [i18]Vlad-Florin Dragoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso:
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation. IACR Cryptol. ePrint Arch. 2024: 1694 (2024) - 2023
- [j10]Marilena Jianu
, Leonard Daus
, Vlad-Florin Dragoi
, Valeriu Beiu
:
Reliability polynomials of consecutive-k-out-of-n:Fsystems have unbounded roots. Networks 82(3): 222-228 (2023) - [c18]Boly Seck
, Pierre-Louis Cayrel
, Vlad-Florin Dragoi
, Idy Diop
, Morgan Barbier, Jean Belo Klamti
, Vincent Grosso
, Brice Colombier
:
A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial. AFRICACRYPT 2023: 105-125 - [c17]Vincent Grosso
, Pierre-Louis Cayrel
, Brice Colombier
, Vlad-Florin Dragoi
:
Punctured Syndrome Decoding Problem - Efficient Side-Channel Attacks Against Classic McEliece. COSADE 2023: 170-192 - [c16]Hsin-Po Wang, Vlad-Florin Dragoi:
Fast Methods for Ranking Synthetic BECs. ISIT 2023: 1562-1567 - [i17]Hsin-Po Wang, Vlad-Florin Dragoi:
Fast Methods for Ranking Synthetic BECs. CoRR abs/2304.11781 (2023) - [i16]Mohammad Rowshan
, Vlad-Florin Dragoi, Jinhong Yuan:
On the Closed-form Weight Enumeration of Polar Codes: 1.5d-weight Codewords. CoRR abs/2305.02921 (2023) - [i15]Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi:
Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece. IACR Cryptol. ePrint Arch. 2023: 308 (2023) - [i14]Brice Colombier, Vincent Grosso, Pierre-Louis Cayrel, Vlad-Florin Dragoi:
Horizontal Correlation Attack on Classic McEliece. IACR Cryptol. ePrint Arch. 2023: 546 (2023) - 2022
- [j9]Vlad-Florin Dragoi
, Valeriu Beiu
:
Fast reliability ranking of matchstick minimal networks. Networks 79(4): 479-500 (2022) - [j8]Brice Colombier
, Vlad-Florin Dragoi
, Pierre-Louis Cayrel, Vincent Grosso:
Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem. IEEE Trans. Inf. Forensics Secur. 17: 3407-3420 (2022) - [c15]Boly Seck
, Pierre-Louis Cayrel
, Idy Diop
, Vlad-Florin Dragoi
, Kalen Couzon, Brice Colombier
, Vincent Grosso
:
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems. ICISC 2022: 219-234 - [c14]Ferucio Laurentiu Tiplea, Vlad-Florin Dragoi
:
Generalized Inverse Based Decoding. ISIT 2022: 2791-2796 - [c13]Vlad-Florin Dragoi
, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. ITW 2022: 482-487 - [i13]Ferucio Laurentiu Tiplea, Vlad-Florin Dragoi:
Generalized Inverse Based Decoding. CoRR abs/2202.08640 (2022) - [i12]Marilena Jianu, Leonard Daus, Vlad-Florin Dragoi, Valeriu Beiu:
Consecutive k-out-of-n: F Systems Have Unbounded Roots. CoRR abs/2208.14173 (2022) - [i11]Brice Colombier, Vlad-Florin Dragoi, Pierre-Louis Cayrel, Vincent Grosso:
Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem. IACR Cryptol. ePrint Arch. 2022: 125 (2022) - [i10]Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. IACR Cryptol. ePrint Arch. 2022: 636 (2022) - 2021
- [j7]Vlad-Florin Dragoi
, Gabriela Cristescu
:
Bhattacharyya Parameter of Monomial Codes for the Binary Erasure Channel: From Pointwise to Average Reliability. Sensors 21(9): 2976 (2021) - [j6]Gabriela Cristescu, Vlad-Florin Dragoi
:
Efficient Approximation of Two-Terminal Networks Reliability Polynomials Using Cubic Splines. IEEE Trans. Reliab. 70(3): 1193-1203 (2021) - [c12]Pierre-Louis Cayrel
, Brice Colombier
, Vlad-Florin Dragoi
, Alexandre Menu, Lilian Bossuet
:
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem. EUROCRYPT (2) 2021: 438-467 - [c11]Vlad-Florin Dragoi
, Andreea Szocs
:
Structural Properties of Self-dual Monomial Codes with Application to Code-Based Cryptography. IMACC 2021: 16-41 - [i9]Vlad-Florin Dragoi, Gabriela Cristescu:
Bhattacharyya parameter of monomials codes for the Binary Erasure Channel: from pointwise to average reliability. CoRR abs/2103.10803 (2021) - [i8]Gabriela Cristescu, Vlad-Florin Dragoi, Sorin-Horatiu Hoara:
Generalized Convexity Properties and Shape Based Approximation in Networks Reliability. CoRR abs/2111.06604 (2021) - 2020
- [j5]Vlad Dragoi
, Valeriu Beiu
:
Studying the Binary Erasure Polarization Subchannels Using Network Reliability. IEEE Commun. Lett. 24(1): 62-66 (2020) - [j4]Vlad-Florin Dragoi
, Pierre-Louis Cayrel
, Brice Colombier
, Dominic Bucerzan
, Sorin Hoara:
Solving a Modified Syndrome Decoding Problem using Integer Programming. Int. J. Comput. Commun. Control 15(5) (2020) - [c10]Valeriu Beiu
, Vlad-Florin Dragoi
, Roxana-Mariana Beiu
:
Why Reliability for Computing Needs Rethinking. ICRC 2020: 16-25 - [c9]Vlad-Florin Dragoi
, Alin Tiberiu Lacatus, Alexandru Popoviciu:
Combinatorial Algorithms for Integer Syndrome Decoding Problem. SOFA 2020: 631-647 - [c8]Vlad-Florin Dragoi
, Valeriu Beiu:
Consecutive Systems Asymptotic Threshold Behaviors. SOFA 2020: 691-701 - [i7]Vlad-Florin Dragoi, Simon Robin Cowell, Valeriu Beiu:
Tight Bounds on the Coeffcients of Consecutive k-out-of-n: F Systems. CoRR abs/2003.12419 (2020) - [i6]Ali Chouria, Vlad-Florin Dragoi, Jean-Gabriel Luque:
On recursively defined combinatorial classes and labelled trees. CoRR abs/2004.04203 (2020) - [i5]Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet:
Message-recovery Laser Fault Injection Attack on Code-based Cryptosystems. IACR Cryptol. ePrint Arch. 2020: 900 (2020)
2010 – 2019
- 2019
- [i4]Vlad-Florin Dragoi, Valeriu Beiu:
Fast Reliability Ranking of Matchstick Minimal Networks. CoRR abs/1911.01153 (2019) - [i3]Gabriela Cristescu, Vlad-Florin Dragoi:
Cubic spline approximation of the reliability polynomials of two dual hammock networks. CoRR abs/1912.03037 (2019) - 2018
- [j3]Vlad Dragoi
, Hervé Talé Kalachi
:
Cryptanalysis of a Public Key Encryption Scheme Based on QC-LDPC and QC-MDPC Codes. IEEE Commun. Lett. 22(2): 264-267 (2018) - [j2]Vlad Dragoi
, Simon Robin Cowell, Valeriu Beiu
, Sorin Hoara, Pastorel Gaspar:
How Reliable are Compositions of Series and Parallel Networks Compared with Hammocks? Int. J. Comput. Commun. Control 13(5): 772-791 (2018) - [c7]Vlad Dragoi
, Valeriu Beiu
, Dominic Bucerzan
:
Vulnerabilities of the McEliece Variants Based on Polar Codes. SecITC 2018: 376-390 - [c6]Valeriu Beiu
, Simon Robin Cowell
, Vlad-Florin Dragoi
:
On Posets for Reliability: How Fine Can They Be? SOFA (1) 2018: 115-129 - 2017
- [b1]Vlad Dragoi:
Algebraic approach for the study of algorithmic problems coming from cryptography and the theory of error correcting codes. (Approche algébrique pour l'étude et la résolution de problèmes algorithmiques issus de la cryptographie et de la théorie des codes ). University of Rouen, France, 2017 - [j1]Dominic Bucerzan, Pierre-Louis Cayrel, Vlad Dragoi
, Tania Richmond:
Improved Timing Attacks against the Secret Permutation in the McEliece PKC. Int. J. Comput. Commun. Control 12(1): 7-25 (2017) - [c5]Dominic Bucerzan, Vlad Dragoi
, Hervé Talé Kalachi:
Evolution of the McEliece Public Key Encryption Scheme. SECITC 2017: 129-149 - [i2]Vlad Dragoi, Hervé Talé Kalachi:
Cryptanalysis of a public key encryption scheme based on QC-LDPC and QC-MDPC codes. CoRR abs/1712.02167 (2017) - 2016
- [c4]Magali Bardet, Vlad Dragoi
, Jean-Gabriel Luque, Ayoub Otmani
:
Weak Keys for the Quasi-Cyclic MDPC Public Key Encryption Scheme. AFRICACRYPT 2016: 346-367 - [c3]Magali Bardet, Vlad Dragoi
, Ayoub Otmani
, Jean-Pierre Tillich:
Algebraic properties of polar codes from a new polynomial formalism. ISIT 2016: 230-234 - [c2]Magali Bardet, Julia Chaulet, Vlad Dragoi
, Ayoub Otmani
, Jean-Pierre Tillich:
Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes. PQCrypto 2016: 118-143 - [i1]Magali Bardet, Vlad Dragoi, Ayoub Otmani, Jean-Pierre Tillich:
Algebraic Properties of Polar Codes From a New Polynomial Formalism. CoRR abs/1601.06215 (2016) - 2013
- [c1]Vlad Dragoi
, Pierre-Louis Cayrel, Brice Colombier, Tania Richmond:
Polynomial Structures in Code-Based Cryptography. INDOCRYPT 2013: 286-296
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-16 23:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint