[go: up one dir, main page]

Follow
Valérie Gauthier-Umaña
Valérie Gauthier-Umaña
Universidad de los Andes, Departamento de Ingeniería de Sistemas y Computación
Verified email at uniandes.edu.co
Title
Cited by
Cited by
Year
A distinguisher for high-rate McEliece cryptosystems
JC Faugere, V Gauthier-Umaña, A Otmani, L Perret, JP Tillich
IEEE Transactions on Information Theory 59 (10), 6830-6844, 2013
3102013
Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes
A Couvreur, P Gaborit, V Gauthier-Umaña, A Otmani, JP Tillich
Designs, Codes and Cryptography 73 (2), 641-666, 2014
1802014
Transformación digital en las organizaciones
I Páez-Gabriunas, M Sanabria, V Gauthier-Umaña, RA Méndez-Romero, ...
Editorial Universidad del Rosario, 2022
992022
Practical key recovery attacks on two McEliece variants
V Gauthier-Umaña, G Leander
Proceedings of the Second International Conference on Symbolic Computation …, 2010
69*2010
A polynomial-time attack on the BBCRS scheme
A Couvreur, A Otmani, JP Tillich, V Gauthier–Umana
IACR International Workshop on Public Key Cryptography, 175-193, 2015
652015
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
A Couvreur, P Gaborit, V Gauthier-Umaña, A Otmani, JP Tillich
arXiv preprint arXiv:1307.6458, 2013
352013
Blockchain: An opportunity to improve supply chains in the wake of digitalization
L Rivera, V Gauthier-Umaña, C Chauhan
International Journal of Information Management Data Insights 4 (2), 100290, 2024
192024
Post-Quantum Cryptography
V Gauthier-Umaña
Post-Quantum Cryptography, 2011
15*2011
& Saucedo Meza, GM (2022). Transformación digital en las organizaciones. Editorial Universidad del Rosario
I Páez-Gabriunas, M Sanabria, V Gauthier-Umaña, RA Méndez-Romero, ...
14
Modelos epidemiológicos en redes: una presentación introductoria
CEÁ Cabrera, EJA Lotero, V Gauthier-Umaña
Boletín de Matemáticas 22 (1), 21-37, 2015
132015
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
G Cagua, V Gauthier-Umaña, C Lozano-Garzon
IEEE Access, 2025
102025
Practical key recovery attacks on two McEliece variants (2009)
V Gauthier Umana, G Leander
IACR Cryptology ePrint Archive 509, 0
7
Transformación digital en las organizaciones
ILOP Gabriunas, JMS Rangel, V Gauthier-Umaña, RAM Romero, L Rivera
Universidad del Rosario, 2022
62022
A distinguisher-based attack on a variant of McEliece’s cryptosystem based on Reed-Solomon codes
V Gauthier-Umana, A Otmani, JP Tillich
arXiv preprint arXiv:1204.6459, 2012
62012
Voces diversas y disruptivas en tiempos de Revolución 4.0
V Gauthier-Umaña, RA Méndez-Romero, D Suárez
Editorial Universidad del Rosario, 2020
5*2020
Innovación y transformación digital: Dos formas de gestión del conocimiento
D Anzola, N Gómez-Cruz, I Páez-Gabriunas, M Sanabria, VG Umaña, ...
Transformaci\on Digital En Las Organizaciones, 2022
42022
Dual toric codes and polytopes of degree one
VG Uman͂a, M Velasco
SIAM Journal on Discrete Mathematics 29 (1), 683-692, 2015
42015
Transformación digital en las organizaciones
RA Méndez Romero, ILO Páez Gabriunas, V Gauthier-Umaña, ...
Universidad del Rosario, 2022
32022
Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings
RH Deng, V Gauthier-Umaña, M Ochoa, M Yung
Springer, 2019
22019
Recent advances in machine learning for differential cryptanalysis
I Martínez, V López, D Rambaut, G Obando, V Gauthier-Umaña, JF Pérez
Colombian Conference on Computing, 45-56, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20