Claude Carlet

ORCID: 0000-0002-6118-7927
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Coding theory and cryptography
  • Cryptographic Implementations and Security
  • graph theory and CDMA systems
  • Chaos-based Image/Signal Encryption
  • Cellular Automata and Applications
  • Cancer Mechanisms and Therapy
  • Finite Group Theory Research
  • Error Correcting Code Techniques
  • Cooperative Communication and Network Coding
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Polynomial and algebraic computation
  • semigroups and automata theory
  • Advanced Malware Detection Techniques
  • Advanced Algebra and Logic
  • Peptidase Inhibition and Analysis
  • DNA and Biological Computing
  • Metaheuristic Optimization Algorithms Research
  • Cryptography and Residue Arithmetic
  • Computability, Logic, AI Algorithms
  • Advanced Wireless Communication Techniques
  • Intelligence, Security, War Strategy
  • Algebraic structures and combinatorial models
  • Cryptography and Data Security
  • Advanced Combinatorial Mathematics
  • Evolutionary Algorithms and Applications

University of Bergen
2016-2024

Université Paris 8
2015-2024

Laboratoire Analyse, Géométrie et Applications
2014-2023

Centre National de la Recherche Scientifique
2011-2023

Université Sorbonne Paris Nord
2013-2023

Université Paris Cité
2014-2023

Novosibirsk State University
2020-2021

Delft University of Technology
2021

Laboratoire de Mathématiques d'Orsay
2008-2020

Université Paris-Sud
2010-2018

10.1023/a:1008344232130 article Designs Codes and Cryptography 1998-01-01

In this paper, error-correcting codes from perfect nonlinear mappings are constructed, and then employed to construct secret sharing schemes. The obtained in paper very good general, many of them optimal or almost optimal. schemes have two types access structures. first type is democratic the sense that every participant involved same number minimal-access sets. second structures, there a few dictators who minimal set, while each remaining participants

10.1109/tit.2005.847722 article EN IEEE Transactions on Information Theory 2005-06-01

Boolean functions are essential to systems for secure and reliable communication. This comprehensive survey of cryptography coding covers the whole domain all important results, building on author's influential articles with additional topics recent results. A useful resource researchers graduate students, book balances detailed discussions properties parameters examples various types cryptographic attacks that motivate consideration these parameters. It provides necessary background...

10.1017/9781108606806 preprint EN 2020-10-31

10.1007/s10623-015-0145-8 article EN Designs Codes and Cryptography 2015-12-26

We recall why linear codes with complementary duals (LCD codes) play a role in counter-measures to passive and active side-channel analyses on embedded cryptosystems. The rate the minimum distance of such LCD must be as large possible. known primary construction cyclic codes, investigate other constructions, expanded Reed-Solomon generalized residue for which we study idempotents. These constructions do not allow reach all desired parameters. then those secondary preserve property,...

10.3934/amc.2016.10.131 article EN Advances in Mathematics of Communications 2016-03-01

The hull $H(C)$ of a linear code $C$ is defined by $H(C)=C \cap C^\perp$. A with complementary dual (LCD) $H(C)=\{0\}$. dimension the an invariant under permutation equivalence. For binary and ternary codes also monomial equivalence we show that this determined extended weight enumerator code.\\ not if $q\geq 4$. We every ${\mathbb F}_q $-linear equivalent LCD in case $q \geq proof uses techniques from Gr\"obner basis theory. conclude there exists parameters $[n,k,d]_q$ 4$, then same...

10.1109/tit.2018.2789347 article EN IEEE Transactions on Information Theory 2018-01-04

Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It has been observed that Boolean function f used as primitive, and interpreted multivariate polynomial over F/sub 2/, should not low degree multiples obtained by multiplication with nonzero functions. In this paper, we show having nonlinearity is (also) weak against attacks, extend result to higher order nonlinearities. Next, present enumeration results on linearly independent annihilators. We also...

10.1109/tit.2006.876253 article EN IEEE Transactions on Information Theory 2006-07-01

10.1016/j.jco.2003.08.008 article EN Journal of Complexity 2004-01-17

New infinite classes of almost bent and perfect nonlinear polynomials are constructed. It is shown that they affine inequivalent to any sum a power function an

10.1109/tit.2005.864481 article EN IEEE Transactions on Information Theory 2006-03-01

This paper introduces the first found infinite classes of almost perfect nonlinear (APN) polynomials which are not Carlet-Charpin-Zinoviev (CCZ)-equivalent to power functions (at least for some values number variables). These two APN binomials from F <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2n</sub> (for n divisible by 3, resp., 4). We prove that these extended affine (EA)-inequivalent any function and they CCZ-inequivalent Gold, Kasami,...

10.1109/tit.2008.928275 article EN IEEE Transactions on Information Theory 2008-08-27

10.1016/j.ffa.2008.10.001 article EN publisher-specific-oa Finite Fields and Their Applications 2008-11-14

10.1007/s10623-018-0463-8 article EN Designs Codes and Cryptography 2018-02-05

In this correspondence, the weight distribution of a class linear codes based on perfect nonlinear functions (also called planar functions) is determined. The under study are either optimal or among best known, and have nice applications in cryptography.

10.1109/tit.2005.862125 article EN IEEE Transactions on Information Theory 2006-01-25

10.1016/j.jcta.2005.07.009 article EN publisher-specific-oa Journal of Combinatorial Theory Series A 2005-09-27

We introduce a generalization to Z/sub 2/k of the Gray map and generalized versions Kerdock Delsarte-Goethals codes.

10.1109/18.681328 article EN IEEE Transactions on Information Theory 1998-07-01
Coming Soon ...