- Articles scientifiques indexé
2019
- Quasi-Dyadic Girault Identification Scheme, In : C. Carlet , S. Guilley, A. Nitaj and A. Souidi (Eds), Codes, Cryptology, and Information Security. C2SI 2019. Lecture Notes in Computer Science, vol 11445, Springer, Cham, pp. 307–321.
- Generalized subspace subcodes with application in cryptology, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 65, NO. 8, AUGUST 2019
- DAGS: Reloaded Revisiting Dyadic Key Encapsulation, In : M. Baldi, P. Santini and Persichiti (Eds), Codes Based Cryptography, CBC 2019. Lecture Notes in Computer Science, vol 11666, Springer, PP. 69-85
- Designing a public key cryptosystem based on quasi-cyclic subspace subcodes of Reed Soloman ( accepted for publication In : C. T. Gueye, E. Persichiti, P. L. Cayrel and J. Buchmann (Eds), Algebra, Codes and Cryptology A2C 2019 –Communications in Computer and Information Sciences, vol 1133 , Springer)
- Improvement of binary and non binary Statistical Decoding Algorithm (accepted for publication in ICISC 2019 : icisc.org
2018
- On the Performance and Security of Multiplication in GF(2N). Cryptography2(3): 25 (2018)
- DAGS: Key Encapsulation from Dyadic GS codes, Math. Cryptol. 2018; 12(4): 221–239
2017
- Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field Fq, In : S El Hajji, Nitaj and A. Souidi (Eds), Codes, Cryptology, and Information Security. C2SI 2017. Lecture Notes in Computer Science, vol 10194, Springer, Cham, pp. 96–109.
- NP-Complet Problem in Coding Theory with Application to Code-based Cryptography, , In : S El Hajji, Nitaj and A. Souidi (Eds), Codes, Cryptology, and Information Security. C2SI 2017. Lecture Notes in Computer Science, vol 10194, Springer, Cham, pp. 230–237.
- Efficient Implementation of Hybrid Encryption from Coding Theory, , In : S El Hajji, Nitaj and A. Souidi (Eds), Codes, Cryptology, and Information Security. C2SI 2017. Lecture Notes in Computer Science, vol 10194, Springer, Cham, pp. 254–264.
- NP-completeness of the Goppa parameterized random binary quasi-dyadic Syndrome Decoding Problem , International Journal of Information and Coding Theory 4, No. 4, pp.276–288, 2017.
2016
- NP-completeness of the random binary quasi-dyadic Coset Weight problem and the random binary quasi-dyadic Subspace Weight problem , Gulf Journal of Mathematics Vol 4, Issue 4 pp. 206-216, 2016.
- A new secret function for modular lattices, BJMCS, 18(3) : 1-10, 2016.
- On cyclic codes over Fpk +vFpk + v2Fpk+…+vrFpk, , Gulf Journal of Mathematics Vol 4, Issue 4 pp. 130-139, 2016.
2015
- Critical attacks in code-based cryptography J. Information and Coding Theory, Vol. 3, No. 2, 158-176, 2015.
2014
- On Perfect Commutative EIFA-rings. BJMCS. 4(8) : 1166-1169, 2014.
- On Commutative EKFN-ring with Ascending Chain on Annihilators. BJMCS. 4(3) : 426-431, 2014.
2013
- Secure Cryptographic Scheme based on Modified Reed Muller Codes, International Journal of Security and Its Applications Vol. 7, No. 3, May, 2013.
- On Mono-corect Modules, British Journal of Mathematics & Computer Sciences 3(4): 598-604, 2013`
2012
- A New Characterization of Commutative Strongly Pi-Regular Rings, Journal of Mathematics Research; Vol. 4, No. 5; 2012
2011
- Erasure Decoding for Gabidulin Codes, J. Math. Model. Algor, (2011) 10: PP. 277-291 DOI 10.1007/s10852-011-9155-3. http://www.springer.com/mathematics/applications/journal/10852
- Decoding Algorithm for Gabidulin Codes, International Journal of Mathematics and Computer Science, 6(2011), no.1, PP. 45–54
- New families of two weight of cyclic projective codes construct as the direct sum of two one weight cyclic codes, International J. of Math. Sci. & Appls. (IJMSEA) ISSN 0973-9424, Vol 5, No. II,(March, 2011), pp, 339-352.
2010
- Gabidulin Codes that are Generalized Reed Solomon Codes. International journal of Algebra vol. 4, 2010, n° 3, 119-142. MR2577461, Zbl 1195.94094.
2006
- Affine Invariant Codes over $Z 4$ with Linear Gray image. Global Journal of Pure and Applied Mathematics, Vol. 2 N° 1 (2006), PP. 61-72.
- Binary Image of Affine Invariant Codes over Z4, Sci. Vol. 6 N° 2 (2006), pp.75-87.
2004
- Affine invariant codes over $Z 4$ and their binary image, Sci. Res. J. 8 (2004), no.11, 328–335.
- On commutative $FGS$-rings. Algebra 32 (2004), no. 5, 1715—1727
2000
- On commutative FGS-rings with ascending condition on annihilators. Lect. Not. in Pure and Appl. Math.Vol. 217(2000) pp. 227-229.
1997
- On commutative FGI-rings. Extracta Mathematicae Vol 12, Num 3, 255-259(1997).
2. Chapitres de Livres
- Coding and Cryptography », USTHB, Alger, 2-5 Novembre 2015, Sihem Mesnager, Kenza Guenda and Kamel Betina (Eds)www.latn.usthb.dz/spip.php?article35
- Codes, Cryptology, and Information Security C2SI 2017, Said El Hajji, Abderrahmane Nitaj, El Mamoun Souidi (Eds.), Lecture Notes in Computer Science, Vol. 10194, Springer Online version
- Codes, Cryptology, and Information Security C2SI 2018 Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi (Eds.), Lecture Notes in Computer Science, Vol. 11445, Springer Online version
- Algebre, Codes, Cryptology A2C 2019 T. Gueye, E. Persichiti, P. L. Cayrel and J. Buchmann (Eds), Communications in Computer and Information Sciences, vol 1133 , Springer)
- Geometry and combinatorial Aspects of commutative Algebra Marcel Dekker New York (2001)
3. Ouvrages
- Non-Associative and Non-Commutative Algebra and Operator Theory
NANCAOT 2014, Gueye Cheikh Thiecoumba, Siles Molina Mercedes (Eds), Springer Proceedings in Mathematics & Statistics, Springer ISBN 13 : 978-3319239000
- Algebre, Codes, Cryptology A2C 2019 T. Gueye, E. Persichiti, P. L. Cayrel and J. Buchmann (Eds), Communications in Computer and Information Sciences, vol 1133 , Springer ISBN 978-3-030-36237-9)