| Publication | Date of Publication | Type |
|---|
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs Lecture Notes in Computer Science | 2023-05-26 | Paper |
A physical study of the LLL algorithm Journal of Number Theory | 2023-01-12 | Paper |
A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3 1515.941 | 2022-12-21 | Paper |
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite Information Security Practice and Experience | 2022-12-09 | Paper |
Cryptanalysis of the lifted unbalanced oil vinegar signature scheme | 2022-12-07 | Paper |
Homomorphic Encryption Standard Protecting Privacy through Homomorphic Encryption | 2022-11-02 | Paper |
Efficient key recovery for all HFE signature variants | 2022-03-31 | Paper |
The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes | 2021-12-08 | Paper |
New complexity estimation on the rainbow-band-separation attack Theoretical Computer Science | 2021-11-18 | Paper |
Multivariate public key cryptosystems Advances in Information Security | 2021-08-11 | Paper |
A physical study of the LLL algorithm | 2021-06-03 | Paper |
The singularity attack to the multivariate signature scheme HIMQ-3 Advances in Mathematics of Communications | 2021-05-12 | Paper |
Giophantus distinguishing attack is a low dimensional learning with errors problem Advances in Mathematics of Communications | 2020-11-07 | Paper |
A framework for universally composable oblivious transfer from one-round key-exchange | 2020-05-06 | Paper |
One sample ring-LWE with rounding and its application to key exchange | 2020-01-30 | Paper |
Giophantus distinguishing attack is a low dimensional learning with errors problem Advances in Mathematics of Communications | 2019-11-26 | Paper |
A key exchange based on the short integer solution problem and the learning with errors problem | 2019-10-14 | Paper |
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction Japan Journal of Industrial and Applied Mathematics | 2018-12-07 | Paper |
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack IEEE Transactions on Computers | 2018-12-04 | Paper |
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction (short paper) | 2018-10-24 | Paper |
The Beauty and the Beasts -- the hard cases in LLL reduction | 2018-10-24 | Paper |
Complete attack on RLWE key exchange with reused keys, without signal leakage | 2018-09-26 | Paper |
HMFEv -- an efficient multivariate signature scheme | 2018-09-12 | Paper |
Improved cryptanalysis of HFEv- via projection | 2018-06-22 | Paper |
Post-quantum secure remote password protocol from RLWE problem | 2018-04-20 | Paper |
LLL and stochastic sandpile models | 2018-04-07 | Paper |
Post-Quantum Cryptography—A New Opportunity and Challenge for the Mathematics Community Notices of the American Mathematical Society | 2017-10-20 | Paper |
Provably secure password authenticated key exchange based on RLWE for the post-quantum world Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Design Principles for HFEv- Based Multivariate Signature Schemes Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Extension field cancellation: a new central trapdoor for multivariate quadratic systems Post-Quantum Cryptography | 2016-04-26 | Paper |
A practical attack on patched MIFARE Classic Information Security and Cryptology | 2015-12-02 | Paper |
Authenticated key exchange from ideal lattices Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption Finite Fields and their Applications | 2015-08-19 | Paper |
Linear algebra to compute Syzygies and Gröbner bases Proceedings of the 36th international symposium on Symbolic and algebraic computation | 2015-06-09 | Paper |
ZHFE, a new multivariate public key encryption scheme Post-Quantum Cryptography | 2015-01-14 | Paper |
The cubic simple matrix encryption scheme Post-Quantum Cryptography | 2015-01-14 | Paper |
Degree of regularity for HFE Minus (HFE\(-\)) | 2014-12-30 | Paper |
Inverting square systems algebraically is exponential Finite Fields and their Applications | 2014-02-11 | Paper |
Solving degree and degree of regularity for polynomial systems over a finite field Lecture Notes in Computer Science | 2013-12-10 | Paper |
New variants of the square-vinegar signature scheme Revista Colombiana de Matemáticas | 2013-07-10 | Paper |
Simple matrix scheme for encryption Post-Quantum Cryptography | 2013-06-14 | Paper |
Degree of regularity for HFEV and HFEV-- Post-Quantum Cryptography | 2013-06-14 | Paper |
GROWTH OF THE IDEAL GENERATED BY A QUADRATIC MULTIVARIATE FUNCTION OVER GF(3) Journal of Algebra and its Applications | 2013-06-05 | Paper |
Embedded surface attack on multivariate public key cryptosystems from Diophantine equations Information Security and Cryptology | 2013-05-28 | Paper |
An algebraic broadcast attack against NTRU Information Security and Privacy | 2012-09-07 | Paper |
High-speed hardware implementation of Rainbow signature on FPGAs Post-Quantum Cryptography | 2011-11-25 | Paper |
Inverting HFE systems is quasi-polynomial for all fields Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Kipnis-Shamir attack on unbalanced oil-vinegar scheme Information Security Practice and Experience | 2011-05-19 | Paper |
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems Cryptology and Network Security | 2010-12-07 | Paper |
MXL\(_3\): an efficient algorithm for computing Gröbner bases of zero-dimensional ideals Information, Security and Cryptology – ICISC 2009 | 2010-07-16 | Paper |
Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared Information, Security and Cryptology – ICISC 2009 | 2010-07-16 | Paper |
Cryptanalysis of two quartic encryption schemes and one improved MFE scheme Post-Quantum Cryptography | 2010-06-17 | Paper |
Growth of the ideal generated by a quadratic Boolean function Post-Quantum Cryptography | 2010-06-17 | Paper |
Secure Variants of the Square Encryption Scheme Post-Quantum Cryptography | 2010-06-17 | Paper |
Mutant Zhuang-Zi algorithm Post-Quantum Cryptography | 2010-06-17 | Paper |
Flexible partial enlargement to accelerate Gröbner basis computation over \(\mathbb{F}_2\) Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography Gröbner Bases, Coding, and Cryptography | 2009-12-16 | Paper |
Algebraic Attack on the MQQ Public Key Cryptosystem Cryptology and Network Security | 2009-11-26 | Paper |
SSE Implementation of Multivariate PKCs on Modern x86 CPUs Lecture Notes in Computer Science | 2009-11-10 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Square, a New Multivariate Encryption Scheme Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Multivariate Public Key Cryptography Post-Quantum Cryptography | 2009-03-12 | Paper |
Analysis of the SMS4 Block Cipher Information Security and Privacy | 2009-03-06 | Paper |
Kipnis-Shamir Attack on HFE Revisited Information Security and Cryptology | 2009-02-10 | Paper |
Multivariates Polynomials for Hashing Information Security and Cryptology | 2009-02-10 | Paper |
Algebraic Attack on HFE Revisited Lecture Notes in Computer Science | 2008-11-20 | Paper |
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy Post-Quantum Cryptography | 2008-11-11 | Paper |
Square-Vinegar Signature Scheme Post-Quantum Cryptography | 2008-11-11 | Paper |
Could SFLASH be Repaired? Automata, Languages and Programming | 2008-08-19 | Paper |
New Differential-Algebraic Attacks and Reparametrization of Rainbow Applied Cryptography and Network Security | 2008-06-13 | Paper |
Rainbow, a New Multivariable Polynomial Signature Scheme Applied Cryptography and Network Security | 2007-09-24 | Paper |
ℓ-Invertible Cycles for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic ( ${\mathcal{MQ}}$ ) Public Key Cryptography Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
scientific article; zbMATH DE number 5149704 (Why is no real title available?) | 2007-05-07 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Coding and Cryptography Lecture Notes in Computer Science | 2007-05-02 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Multivariate public key cryptosystems Advances in Information Security | 2006-10-18 | Paper |
Cryptanalysis of the new TTS scheme in CHES 2004 International Journal of Information Security | 2006-10-13 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
CRYPTANALYSIS OF AN IMPLEMENTATION SCHEME OF THE TAMED TRANSFORMATION METHOD CRYPTOSYSTEM Journal of Algebra and its Applications | 2005-03-14 | Paper |
Universal \(\mathcal R\)-matrix for quantum affine algebras \(U_q(A_2^{(2)})\) and \(U_q(\widehat{\text{osp}}(1|2))\) with Drinfeld co\-mul\-ti\-plication. Advances in Mathematics | 2005-02-22 | Paper |
scientific article; zbMATH DE number 2127866 (Why is no real title available?) | 2005-01-14 | Paper |
On the integral construction of the universal R-matrix for quantum current superalgebra \(U_q(\widehat{\text{osp}}(1,2))\). Czechoslovak Journal of Physics | 2004-09-07 | Paper |
scientific article; zbMATH DE number 2046135 (Why is no real title available?) | 2004-02-23 | Paper |
A remark on the FRTS realization and Drinfeld realization of quantum affine superalgebra \(U_q(\widehat{osp} (1,2))\) Letters in Mathematical Physics | 2004-02-08 | Paper |
scientific article; zbMATH DE number 1560228 (Why is no real title available?) | 2003-08-05 | Paper |
On the FRTS approach to quantized current algebras Letters in Mathematical Physics | 2001-12-02 | Paper |
Factorization of the universal \({\mathcal R}\)-matrix for \(U_q (\widehat{sl}_2)\) Theoretical and Mathematical Physics | 2001-08-28 | Paper |
Integral presentations for the universal \(R\)-matrix Letters in Mathematical Physics | 2001-07-02 | Paper |
scientific article; zbMATH DE number 1424470 (Why is no real title available?) | 2001-01-14 | Paper |
scientific article; zbMATH DE number 1549587 (Why is no real title available?) | 2001-01-08 | Paper |
scientific article; zbMATH DE number 1442027 (Why is no real title available?) IMRN. International Mathematics Research Notices | 2000-12-11 | Paper |
Spinor representations of \(U_q(\widehat{\mathfrak gl}(n))\) and quantum boson-fermion correspondence Communications in Mathematical Physics | 2000-09-06 | Paper |
Quantized W-algebra of sl(2, 1) and Quantum Parafermions of Uq(^sl(2)) Journal of Nonlinear Mathematical Physics | 2000-08-15 | Paper |
Hopf algebra extension of a Zamolochikov algebra and its double Journal of Mathematical Physics | 1999-11-21 | Paper |
Partial Gauss decomposition, and Zamolodchikov algebra Journal of Physics A: Mathematical and General | 1999-11-02 | Paper |
Drinfeld comultiplication and vertex operators Journal of Geometry and Physics | 1999-04-13 | Paper |
Quantum current operators. I: Zeros and poles of quantum current operators and the condition of quantum integrability Publications of the Research Institute for Mathematical Sciences, Kyoto University | 1998-06-11 | Paper |
Quantum current operators. II: Difference equations of quantum current operators and quantum parafermion construction Publications of the Research Institute for Mathematical Sciences, Kyoto University | 1998-06-11 | Paper |
Generalization of Drinfeld quantum affine algebras Letters in Mathematical Physics | 1997-11-11 | Paper |
Crystal algebra Letters in Mathematical Physics | 1997-11-09 | Paper |
Spinor representations of \(U_ q(\widehat{\mathfrak o}(N))\) Letters in Mathematical Physics | 1997-05-11 | Paper |
scientific article; zbMATH DE number 854141 (Why is no real title available?) | 1996-10-15 | Paper |
The center of a quantum affine algebra at the critical level Mathematical Research Letters | 1996-02-21 | Paper |
Isomorphism of two realizations of quantum affine algebra \(U_ q(\widehat{\mathfrak{gl}}(n))\) Communications in Mathematical Physics | 1994-05-06 | Paper |
A proof of a conjecture of C. L. Siegel Journal of Number Theory | 1994-04-24 | Paper |
Zeros and poles of quantum current operators and the condition of quantum integrability | N/A | Paper |
Generalization and Deformation of Drinfeld quantum affine algebras | N/A | Paper |
Difference equations of quantum current operators and quantum parafermion construction | N/A | Paper |
Quantum current operators (III): Commutative quantum current operators, semi-infinite construction and functional models | N/A | Paper |