default search action
Cheikh Thiecoumba Gueye
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c8]Boly Seck, Cheikh Thiécoumba Gueye, Gilbert Ndollane Dione, Jean Belo Klamti, Pierre-Louis Cayrel, Idy Diop, Ousmane Ndiaye:
Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes. CBCrypto 2022: 77-89 - 2021
- [c7]Thierry P. Berger, Anta Niane Gueye, Cheikh Thiecoumba Gueye, M. Anwarul Hasan, Jean Belo Klamti, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Olivier Ruatta:
Security Analysis of a Cryptosystem Based on Subspace Subcodes. CBCrypto 2021: 42-59
2010 – 2019
- 2019
- [j6]Thierry P. Berger, Cheikh Thiécoumba Gueye, Jean Belo Klamti:
Generalized Subspace Subcodes With Application in Cryptology. IEEE Trans. Inf. Theory 65(8): 4641-4657 (2019) - [c6]Brice Odilon Boidje, Cheikh Thiecoumba Gueye, Gilbert Ndollane Dione, Jean Belo Klamti:
Quasi-Dyadic Girault Identification Scheme. C2SI 2019: 307-321 - [c5]Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini:
DAGS: Reloaded Revisiting Dyadic Key Encapsulation. CBC 2019: 69-85 - [c4]Pierre-Louis Cayrel, Cheikh Thiécoumba Gueye, Junaid Ahmad Khan, Jean Belo Klamti, Edoardo Persichetti:
Improvement of Binary and Non Binary Statistical Decoding Algorithm. ICISC 2019: 194-207 - 2018
- [j5]Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh Thiecoumba Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub:
On the Performance and Security of Multiplication in GF(2N). Cryptogr. 2(3): 25 (2018) - [j4]Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini:
DAGS: Key encapsulation using dyadic GS codes. J. Math. Cryptol. 12(4): 221-239 (2018) - [i3]Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini:
DAGS: Reloaded Revisiting Dyadic Key Encapsulation. IACR Cryptol. ePrint Arch. 2018: 1203 (2018) - 2017
- [j3]Pierre-Louis Cayrel, Mbouye Khady Diagne, Cheikh Thiécoumba Gueye:
NP-completeness of the Goppa parameterised random binary quasi-dyadic syndrome decoding problem. Int. J. Inf. Coding Theory 4(4): 276-288 (2017) - [c3]Cheikh Thiécoumba Gueye, Jean Belo Klamti, Shoichi Hirose:
Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field \mathbb F_q. C2SI 2017: 96-109 - [c2]Thierry P. Berger, Cheikh Thiécoumba Gueye, Jean Belo Klamti:
A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography. C2SI 2017: 230-237 - [c1]Pierre-Louis Cayrel, Cheikh Thiecoumba Gueye, El Hadji Modou Mboup, Ousmane Ndiaye, Edoardo Persichetti:
Efficient Implementation of Hybrid Encryption from Coding Theory. C2SI 2017: 254-264 - [i2]Thierry P. Berger, Cheikh Thiécoumba Gueye, Jean Belo Klamti:
Generalized subspace subcodes with application in cryptology. CoRR abs/1704.07882 (2017) - [i1]Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini:
DAGS: Key Encapsulation using Dyadic GS Codes. IACR Cryptol. ePrint Arch. 2017: 1037 (2017) - 2015
- [j2]Pierre-Louis Cayrel, Cheikh Thiecoumba Gueye, Ousmane Ndiaye, Robert Niebuhr:
Critical attacks in code-based cryptography. Int. J. Inf. Coding Theory 3(2): 158-176 (2015) - 2011
- [j1]Regis F. Babindamana, Cheikh Thiecoumba Gueye:
Erasure Decoding for Gabidulin Codes. J. Math. Model. Algorithms 10(3): 277-291 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint