Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of the new TTS scheme in CHES 2004., , and . Int. J. Inf. Sec., 5 (4): 231-240 (2006)Cryptanalysis of HFEv and Internal Perturbation of HFE., and . Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 288-301. Springer, (2005)Secure PRNGs from Specialized Polynomial Maps over Any Fq., , , and . IACR Cryptology ePrint Archive, (2007)Kipnis-Shamir's Attack on HFE Revisited., , and . IACR Cryptology ePrint Archive, (2007)Inverting the Square systems is exponential.. IACR Cryptology ePrint Archive, (2011)A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)., , and . IACR Cryptology ePrint Archive, (2019)Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems., , , , and . WCC, volume 3969 of Lecture Notes in Computer Science, page 242-251. Springer, (2005)Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack., , , and . IEEE Trans. Computers, 67 (11): 1584-1593 (2018)Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol., , , , and . IACR Cryptol. ePrint Arch., (2017)Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS., , , , and . Int. J. Netw. Secur., 20 (5): 923-930 (2018)