| Publication | Date of Publication | Type |
|---|
Practical attack on all parameters of the DME signature scheme | 2024-11-13 | Paper |
Improved cryptanalysis of HFERP | 2024-11-12 | Paper |
2F -- a new method for constructing efficient multivariate encryption schemes Post-Quantum Cryptography | 2023-07-07 | Paper |
Improving support-minors rank attacks: applications to G\textit{e}MSS and Rainbow Advances in Cryptology – CRYPTO 2022 | 2023-06-30 | Paper |
Improvements of algebraic attacks for solving the rank decoding and MinRank problems | 2023-03-21 | Paper |
Practical cryptanalysis of \(k\)-ary \(C^\ast\) Post-Quantum Cryptography | 2022-10-13 | Paper |
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme Post-Quantum Cryptography | 2022-10-13 | Paper |
A rank attack against extension field cancellation Post-Quantum Cryptography | 2022-10-13 | Paper |
New practical multivariate signatures from a nonlinear modifier | 2022-03-22 | Paper |
On the effect of projection on rank attacks in multivariate cryptography | 2022-03-22 | Paper |
A multivariate cryptosystem inspired by random linear codes Finite Fields and their Applications | 2021-02-19 | Paper |
All in the \(C^*\) family Designs, Codes and Cryptography | 2020-05-21 | Paper |
On the complexity of ``Superdetermined minrank instances | 2020-02-25 | Paper |
Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems | 2020-02-14 | Paper |
EFLASH: a new multivariate encryption scheme | 2019-02-20 | Paper |
An updated security analysis of PFLASH | 2018-09-12 | Paper |
Improved attacks for characteristic-2 parameters of the cubic ABC Simple Matrix Encryption scheme | 2018-09-12 | Paper |
Key recovery attack for all parameters of \(\mathrm{HFE}^-\) | 2018-09-12 | Paper |
Key recovery attack for ZHFE | 2018-09-12 | Paper |
The number of Boolean functions with multiplicative complexity 2 International Journal of Information and Coding Theory | 2018-08-02 | Paper |
Improved cryptanalysis of HFEv- via projection | 2018-06-22 | Paper |
HFERP -- a new multivariate encryption scheme | 2018-06-22 | Paper |
Total break of the SRP encryption scheme | 2018-04-26 | Paper |
Key recovery attack on the cubic ABC Simple Matrix Multivariate Encryption Scheme | 2018-02-16 | Paper |
Post-Quantum Cryptography—A New Opportunity and Challenge for the Mathematics Community Notices of the American Mathematical Society | 2017-10-20 | Paper |
Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier Journal of Mathematical Cryptology | 2016-06-09 | Paper |
Improved indifferentiability security bound for the JH mode Designs, Codes and Cryptography | 2016-05-19 | Paper |
Security analysis and key modification for ZHFE Post-Quantum Cryptography | 2016-04-26 | Paper |
On the differential security of the HFEv-signature primitive Post-Quantum Cryptography | 2016-04-26 | Paper |
A measure of dependence for cryptographic primitives relative to ideal functions Rocky Mountain Journal of Mathematics | 2015-11-04 | Paper |
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme Post-Quantum Cryptography | 2015-01-14 | Paper |
Differential Properties of the HFE Cryptosystem Post-Quantum Cryptography | 2015-01-14 | Paper |
A classification of differential invariants for multivariate post-quantum cryptosystems Post-Quantum Cryptography | 2013-06-14 | Paper |
On the differential security of multivariate public key cryptosystems Post-Quantum Cryptography | 2011-11-25 | Paper |
Properties of the discrete differential with cryptographic applications Post-Quantum Cryptography | 2010-06-17 | Paper |