Vlad-Florin Dragoi
Cited by
Cited by
Algebraic properties of polar codes from a new polynomial formalism
M Bardet, V Dragoi, A Otmani, JP Tillich
2016 IEEE International Symposium on Information Theory (ISIT), 230-234, 2016
Cryptanalysis of the McEliece public key cryptosystem based on polar codes
M Bardet, J Chaulet, V Dragoi, A Otmani, JP Tillich
Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016 …, 2016
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
PL Cayrel, B Colombier, VF Drăgoi, A Menu, L Bossuet
Annual International Conference on the Theory and Applications of …, 2021
Survey on cryptanalysis of code-based cryptography: From theoretical to physical attacks
V Drăgoi, T Richmond, D Bucerzan, A Legay
2018 7th international conference on computers communications and control …, 2018
Weak keys for the quasi-cyclic MDPC public key encryption scheme
M Bardet, V Dragoi, JG Luque, A Otmani
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
Fast reliability ranking of matchstick minimal networks
VF Drǎgoi, V Beiu
Networks 79 (4), 479-500, 2022
Why reliability for computing needs rethinking
V Beiu, VF Drăgoi, RM Beiu
2020 International Conference on Rebooting Computing (ICRC), 16-25, 2020
Evolution of the McEliece public key encryption scheme
D Bucerzan, V Dragoi, HT Kalachi
Innovative Security Solutions for Information Technology and Communications …, 2017
How reliable are compositions of series and parallel networks compared with hammocks?
V Dragoi, SR Cowell, V Beiu, S Hoara, P Gaspar
International Journal of Computers Communications & Control 13 (5), 772-791, 2018
An algebraic approach for the resolution of algorithmic problems raised by cryptography and coding theory
VF Dragoi
Normandie Université, 2017
Improved timing attacks against the secret permutation in the McEliece PKC
D Bucerzan, PL Cayrel, V Dragoi, T Richmond
International Journal of Computers, Communications and Control, 2017
Profiled side-channel attack on cryptosystems based on the binary syndrome decoding problem
B Colombier, VF Drăgoi, PL Cayrel, V Grosso
IEEE Transactions on Information Forensics and Security 17, 3407-3420, 2022
Cryptanalysis of a public key encryption scheme based on QC-LDPC and QC-MDPC codes
V Dragoi, HT Kalachi
IEEE Communications letters 22 (2), 264-267, 2017
Efficient approximation of two-terminal networks reliability polynomials using cubic splines
G Cristescu, VF Drăgoi
IEEE Transactions on Reliability 70 (3), 1193-1203, 2021
Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem.
B Colombier, VF Dragoi, PL Cayrel, V Grosso
IACR Cryptol. ePrint Arch. 2022, 125, 2022
Vulnerabilities of the McEliece variants based on polar codes
V Drăgoi, V Beiu, D Bucerzan
International Conference on Security for Information Technology and …, 2018
Hammocks versus hammock
V Beiu, SR Cowell, V Drăgoi, S Hoară, P Gaspar
2018 7th International Conference on Computers Communications and Control …, 2018
Can series and parallel compositions improve on hammocks?
V Drăgoi, SR Cowell, S Hoară, P Gaşpar, V Beiu
2018 7th International Conference on Computers Communications and Control …, 2018
On the Closed-form Weight Enumeration of Polar Codes: 1.5d-weight Codewords
VF Drăgoi, M Rowshan, J Yuan
IEEE Transactions on Communications, 2024
Cubic spline approximation of the reliability polynomials of two dual hammock networks
G Cristescu, VF Drăgoi
arXiv preprint arXiv:1912.03037, 2019
The system can't perform the operation now. Try again later.
Articles 1–20