| Publication | Date of Publication | Type |
|---|
Biscuit: new MPCitH signature scheme from structured multivariate polynomials | 2024-05-31 | Paper |
SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures | 2024-04-26 | Paper |
Cryptanalysis of protocols using (Simultaneous) Conjugacy Search Problem in certain Metabelian Platform Groups | 2023-09-25 | Paper |
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem | 2022-09-06 | Paper |
Cryptanalysis of the extension field cancellation cryptosystem Designs, Codes and Cryptography | 2021-06-23 | Paper |
A nearly optimal algorithm to decompose binary forms Journal of Symbolic Computation | 2021-02-18 | Paper |
PKP-based signature scheme | 2020-05-12 | Paper |
A Distinguisher for High-Rate McEliece Cryptosystems IEEE Transactions on Information Theory | 2017-06-08 | Paper |
A superfast randomized algorithm to decompose binary forms Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation | 2017-05-10 | Paper |
Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Polly cracker, revisited Designs, Codes and Cryptography | 2016-05-19 | Paper |
Structural cryptanalysis of McEliece schemes with compact keys Designs, Codes and Cryptography | 2016-04-05 | Paper |
Decomposition of generic multivariate polynomials Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation | 2015-09-17 | Paper |
A polynomial-time key-recovery attack on MQQ cryptosystems Lecture Notes in Computer Science | 2015-08-27 | Paper |
Algebraic cryptanalysis of a quantum money scheme: the noise-free case Lecture Notes in Computer Science | 2015-08-27 | Paper |
Polynomial-time algorithms for quadratic isomorphism of polynomials: the regular case Journal of Complexity | 2015-06-16 | Paper |
Hardness of learning problems over Burnside groups of exponent 3 Designs, Codes and Cryptography | 2015-03-30 | Paper |
Solving polynomial systems over finite fields: improved analysis of the hybrid approach Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation | 2015-03-27 | Paper |
On the complexity of the BKW algorithm on LWE Designs, Codes and Cryptography | 2015-02-19 | Paper |
Algebraic attack against variants of McEliece with Goppa polynomial of a special form Lecture Notes in Computer Science | 2015-01-16 | Paper |
Lazy modulus switching for the BKW algorithm on LWE Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic Designs, Codes and Cryptography | 2013-07-26 | Paper |
Improving the complexity of index calculus algorithms in elliptic curves over binary fields Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
High order derivatives and decomposition of multivariate polynomials Proceedings of the 2009 international symposium on Symbolic and algebraic computation | 2012-05-13 | Paper |
On the relation between the MXL family of algorithms and Gröbner basis algorithms Journal of Symbolic Computation | 2012-05-11 | Paper |
On enumeration of polynomial equivalence classes and their application to MPKC Finite Fields and their Applications | 2012-03-22 | Paper |
On constructing homomorphic encryption schemes from coding theory Cryptography and Coding | 2011-12-16 | Paper |
Polly cracker, revisited Lecture Notes in Computer Science | 2011-12-02 | Paper |
Algebraic precomputations in differential and integral cryptanalysis Information Security and Cryptology | 2011-07-29 | Paper |
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Analysis of the MQQ public key cryptosystem Cryptology and Network Security | 2010-12-07 | Paper |
Algebraic cryptanalysis of curry and flurry using correlated messages Information Security and Cryptology | 2010-11-23 | Paper |
Cryptanalysis of the hidden matrix cryptosystem Lecture Notes in Computer Science | 2010-08-31 | Paper |
Algebraic cryptanalysis of McEliece variants with compact keys Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Security analysis of word problem-based cryptosystems Designs, Codes and Cryptography | 2010-02-25 | Paper |
Hybrid approach for solving multivariate systems over finite fields Journal of Mathematical Cryptology | 2010-02-05 | Paper |
A survey on Polly Cracker systems Gröbner Bases, Coding, and Cryptography | 2009-12-16 | Paper |
An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography Journal of Symbolic Computation | 2009-10-16 | Paper |
Security Analysis of Multivariate Polynomials for Hashing Information Security and Cryptology | 2009-04-29 | Paper |
Cryptanalysis of MinRank Lecture Notes in Computer Science | 2009-02-10 | Paper |
Algebraic Cryptanalysis of 58-Round SHA-1 Fast Software Encryption | 2008-09-16 | Paper |
Cryptanalysis of the TRMS Signature Scheme of PKC’05 Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem Lecture Notes in Computer Science | 2008-05-06 | Paper |
Total Break of the ℓ-IC Signature Scheme Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Cryptanalysis of 2R− Schemes Lecture Notes in Computer Science | 2007-09-04 | Paper |
Coding and Cryptography Lecture Notes in Computer Science | 2007-05-02 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
scientific article; zbMATH DE number 2127871 (Why is no real title available?) | 2005-01-14 | Paper |