Publication | Date of Publication | Type |
---|
SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures | 2024-04-26 | Paper |
Cryptanalysis of protocols using (Simultaneous) Conjugacy Search Problem in certain Metabelian Platform Groups | 2023-09-25 | Paper |
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem | 2022-09-06 | Paper |
Cryptanalysis of the extension field cancellation cryptosystem | 2021-06-23 | Paper |
A nearly optimal algorithm to decompose binary forms | 2021-02-18 | Paper |
PKP-based signature scheme | 2020-05-12 | Paper |
A Distinguisher for High-Rate McEliece Cryptosystems | 2017-06-08 | Paper |
A Superfast Randomized Algorithm to Decompose Binary Forms | 2017-05-10 | Paper |
Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups | 2017-04-28 | Paper |
Polly cracker, revisited | 2016-05-19 | Paper |
Structural cryptanalysis of McEliece schemes with compact keys | 2016-04-05 | Paper |
Decomposition of generic multivariate polynomials | 2015-09-17 | Paper |
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems | 2015-08-27 | Paper |
Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case | 2015-08-27 | Paper |
Polynomial-time algorithms for quadratic isomorphism of polynomials: the regular case | 2015-06-16 | Paper |
Hardness of learning problems over Burnside groups of exponent 3 | 2015-03-30 | Paper |
Solving polynomial systems over finite fields | 2015-03-27 | Paper |
On the complexity of the BKW algorithm on LWE | 2015-02-19 | Paper |
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form | 2015-01-16 | Paper |
Lazy Modulus Switching for the BKW Algorithm on LWE | 2014-03-25 | Paper |
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions | 2014-03-25 | Paper |
Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic | 2013-07-26 | Paper |
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields | 2012-06-29 | Paper |
High order derivatives and decomposition of multivariate polynomials | 2012-05-13 | Paper |
On the relation between the MXL family of algorithms and Gröbner basis algorithms | 2012-05-11 | Paper |
On enumeration of polynomial equivalence classes and their application to MPKC | 2012-03-22 | Paper |
On Constructing Homomorphic Encryption Schemes from Coding Theory | 2011-12-16 | Paper |
Polly Cracker, Revisited | 2011-12-02 | Paper |
Algebraic Precomputations in Differential and Integral Cryptanalysis | 2011-07-29 | Paper |
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants | 2011-03-15 | Paper |
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem | 2011-03-15 | Paper |
Analysis of the MQQ Public Key Cryptosystem | 2010-12-07 | Paper |
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages | 2010-11-23 | Paper |
Cryptanalysis of the Hidden Matrix Cryptosystem | 2010-08-31 | Paper |
Algebraic Cryptanalysis of McEliece Variants with Compact Keys | 2010-06-01 | Paper |
Security analysis of word problem-based cryptosystems | 2010-02-25 | Paper |
Hybrid approach for solving multivariate systems over finite fields | 2010-02-05 | Paper |
A Survey on Polly Cracker Systems | 2009-12-16 | Paper |
An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography | 2009-10-16 | Paper |
Security Analysis of Multivariate Polynomials for Hashing | 2009-04-29 | Paper |
Cryptanalysis of MinRank | 2009-02-10 | Paper |
Algebraic Cryptanalysis of 58-Round SHA-1 | 2008-09-16 | Paper |
Cryptanalysis of the TRMS Signature Scheme of PKC’05 | 2008-06-13 | Paper |
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem | 2008-05-06 | Paper |
Total Break of the ℓ-IC Signature Scheme | 2008-03-05 | Paper |
Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects | 2007-09-24 | Paper |
Cryptanalysis of 2R− Schemes | 2007-09-04 | Paper |
Coding and Cryptography | 2007-05-02 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q3154862 | 2005-01-14 | Paper |