Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of HFEv and Internal Perturbation of HFE., and . Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 288-301. Springer, (2005)Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2., , , and . AFRICACRYPT, volume 6055 of Lecture Notes in Computer Science, page 69-81. Springer, (2010)Cryptanalysis of the new TTS scheme in CHES 2004., , and . Int. J. Inf. Sec., 5 (4): 231-240 (2006)Inverting the Square systems is exponential.. IACR Cryptology ePrint Archive, (2011)Kipnis-Shamir's Attack on HFE Revisited., , and . IACR Cryptology ePrint Archive, (2007)Secure PRNGs from Specialized Polynomial Maps over Any Fq., , , and . IACR Cryptology ePrint Archive, (2007)A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)., , and . IACR Cryptology ePrint Archive, (2019)Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems., , , , and . WCC, volume 3969 of Lecture Notes in Computer Science, page 242-251. Springer, (2005)Growth of the Ideal Generated by a Quadratic Boolean Function., , and . PQCrypto, volume 6061 of Lecture Notes in Computer Science, page 13-27. Springer, (2010)The Singularity Attack to the Multivariate Signature Scheme Himq-3., , , and . IACR Cryptology ePrint Archive, (2019)