1. Articles scientifiques indexé
    2019
  • Quasi-Dyadic Girault Identification Scheme, In : C. Carlet , S. Guilley, A. Nitaj and A. Souidi (Eds), Codes, Cryptology, and Information Security. C2SI 2019. Lecture Notes in Computer Science, vol 11445, Springer, Cham, pp. 307–321.
  • Generalized subspace subcodes with application in cryptology, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 65, NO. 8, AUGUST 2019
  • DAGS: Reloaded Revisiting Dyadic Key Encapsulation, In : M. Baldi, P. Santini and Persichiti
(Eds), Codes Based Cryptography, CBC 2019. Lecture Notes in Computer Science, vol 11666, Springer, PP. 69-85
  • Designing a public key cryptosystem based on quasi-cyclic subspace subcodes of Reed Soloman ( accepted for publication In : C. T. Gueye, E. Persichiti, P. L. Cayrel and J. Buchmann (Eds),  Algebra, Codes and Cryptology  A2C 2019 –Communications in  Computer and Information Sciences, vol 1133 , Springer) 
  • Improvement of binary and non binary Statistical Decoding Algorithm (accepted for publication in ICISC 2019 : icisc.org

2018

  • On the Performance and Security of Multiplication in GF(2N). Cryptography2(3): 25 (2018) 
  • DAGS: Key Encapsulation from Dyadic GS codes, Math. Cryptol. 2018; 12(4): 221–239

        2017

  • Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field Fq, In : S El Hajji, Nitaj and A. Souidi (Eds), Codes, Cryptology, and Information Security. C2SI 2017. Lecture Notes in Computer Science,  vol 10194, Springer, Cham, pp. 96–109.
  • NP-Complet Problem in Coding Theory with Application to Code-based Cryptography, , In : S El Hajji, Nitaj and A. Souidi (Eds), Codes, Cryptology, and Information Security. C2SI 2017. Lecture Notes in Computer Science,  vol 10194, Springer, Cham, pp. 230–237.
  • Efficient Implementation of Hybrid Encryption from Coding Theory, , In : S El Hajji, Nitaj and A. Souidi (Eds), Codes, Cryptology, and Information Security. C2SI 2017. Lecture Notes in Computer Science,  vol 10194, Springer, Cham, pp. 254–264.
  • NP-completeness of the Goppa parameterized random binary quasi-dyadic Syndrome Decoding Problem , International Journal of Information and Coding Theory 4, No. 4, pp.276–288, 2017.

       2016

  • NP-completeness of the random binary quasi-dyadic Coset Weight problem and the random binary quasi-dyadic Subspace Weight problem , Gulf Journal of Mathematics Vol 4, Issue 4 pp. 206-216, 2016.
  • A new secret function for modular lattices, BJMCS, 18(3) : 1-10, 2016.
  • On cyclic codes over Fpk +vFpk + v2Fpk+…+vrFpk, , Gulf Journal of Mathematics Vol 4, Issue 4 pp. 130-139, 2016.

       2015

  • Critical attacks in code-based cryptography J. Information and Coding Theory, Vol. 3, No. 2, 158-176, 2015.

2014

  • On Perfect Commutative EIFA-rings. BJMCS. 4(8) : 1166-1169, 2014.
  • On Commutative EKFN-ring with Ascending Chain on Annihilators. BJMCS. 4(3) : 426-431, 2014.

        2013

  • Secure Cryptographic Scheme based on Modified Reed Muller Codes, International Journal of Security and Its Applications Vol. 7, No. 3, May, 2013. 
  • On Mono-corect Modules, British Journal of Mathematics & Computer Sciences 3(4): 598-604, 2013` 


2012

  • A New Characterization of Commutative Strongly Pi-Regular Rings, Journal of Mathematics Research; Vol. 4, No. 5; 2012

2011

  • Decoding Algorithm for Gabidulin Codes, International Journal of Mathematics and Computer Science, 6(2011), no.1, PP. 45–54
  • New families of two weight of cyclic projective codes construct as the direct sum of two one weight cyclic codes, International J. of Math. Sci. &    Appls. (IJMSEA) ISSN 0973-9424, Vol 5, No. II,(March, 2011), pp, 339-352.

2010

  • Gabidulin Codes that are Generalized Reed Solomon Codes. International journal of Algebra vol. 4, 2010,  n°  3, 119-142. MR2577461, Zbl 1195.94094.

2006

  • Affine Invariant Codes over $Z 4$ with Linear Gray image. Global Journal of   Pure and Applied Mathematics, Vol. 2 N° 1 (2006), PP. 61-72.
  • Binary Image of Affine Invariant Codes over Z4, Sci. Vol. 6 N° 2 (2006), pp.75-87.

2004

  • Affine invariant codes over $Z 4$ and their binary image, Sci. Res. J. 8 (2004), no.11, 328–335.
  • On commutative $FGS$-rings. Algebra 32 (2004), no. 5, 1715—1727

2000

  • On commutative FGS-rings with ascending condition on annihilators. Lect. Not. in Pure and Appl. Math.Vol. 217(2000) pp. 227-229.

1997

  • On commutative FGI-rings. Extracta Mathematicae Vol 12, Num 3, 255-259(1997).

    2. Chapitres de Livres
  • Coding and Cryptography », USTHB, Alger, 2-5 Novembre 2015, Sihem Mesnager, Kenza Guenda and Kamel Betina (Eds)www.latn.usthb.dz/spip.php?article35
  • Codes, Cryptology, and Information Security C2SI 2017, Said El Hajji, Abderrahmane Nitaj, El Mamoun Souidi (Eds.), Lecture Notes in Computer Science, Vol. 10194, Springer Online version
  • Codes, Cryptology, and Information Security C2SI 2018 Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi (Eds.), Lecture Notes in Computer Science, Vol. 11445, Springer Online version
  • Algebre, Codes, Cryptology A2C 2019 T. Gueye, E. Persichiti, P. L. Cayrel and J. Buchmann (Eds), Communications in  Computer and Information Sciences, vol 1133 , Springer) 

  • Geometry and combinatorial Aspects of commutative Algebra Marcel Dekker New York (2001)

3. Ouvrages

  • Non-Associative and Non-Commutative Algebra  and Operator Theory 

NANCAOT 2014, Gueye Cheikh Thiecoumba, Siles Molina Mercedes (Eds), Springer Proceedings in Mathematics & Statistics, Springer ISBN 13 : 978-3319239000

  • Algebre, Codes, Cryptology A2C 2019 T. Gueye, E. Persichiti, P. L. Cayrel and J. Buchmann (Eds), Communications in  Computer and Information Sciences, vol 1133 , Springer ISBN 978-3-030-36237-9)