| Publication | Date of Publication | Type |
|---|
A complete analysis of the BKZ lattice reduction algorithm Journal of Cryptology | 2025-01-17 | Paper |
On counterexamples to the Mertens conjecture Research in Number Theory | 2024-12-16 | Paper |
Computing a lattice basis revisited Proceedings of the 2019 on International Symposium on Symbolic and Algebraic Computation | 2020-09-10 | Paper |
| Quantum lattice enumeration and tweaking discrete pruning | 2018-12-20 | Paper |
| Lower bounds on lattice enumeration with extreme pruning | 2018-09-26 | Paper |
Random sampling revisited: lattice enumeration with discrete pruning Lecture Notes in Computer Science | 2017-06-13 | Paper |
Counting co-cyclic lattices SIAM Journal on Discrete Mathematics | 2016-07-22 | Paper |
Structural lattice reduction: generalized worst-case to average-case reductions and homomorphic cryptosystems Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Low-dimensional lattice basis reduction revisited ACM Transactions on Algorithms | 2014-11-18 | Paper |
Approximating the densest sublattice from Rankin's inequality LMS Journal of Computation and Mathematics | 2014-09-05 | Paper |
Rounding and chaining LLL: finding faster small roots of univariate polynomial congruences Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Lattice-based fault attacks on signatures Information Security and Cryptography | 2013-07-09 | Paper |
Faster Gaussian lattice sampling using lazy floating-point arithmetic Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Learning a zonotope and more: cryptanalysis of ntrusign countermeasures Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Solving BDD by enumeration: an update Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Cryptanalysis vs. provable security Information Security and Cryptology | 2013-01-07 | Paper |
Breaking fully-homomorphic-encryption challenges. (Abstract) Cryptology and Network Security | 2012-07-20 | Paper |
Faster algorithms for approximate common divisors: breaking fully-homomorphic-encryption challenges over the integers Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
BKZ 2.0: Better lattice security estimates Lecture Notes in Computer Science | 2011-12-02 | Paper |
Lattice Reduction Algorithms: Theory and Practice Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
An LLL algorithm with quadratic complexity SIAM Journal on Computing | 2010-07-07 | Paper |
Lattice enumeration using extreme pruning Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Hermite’s Constant and Lattice Algorithms The LLL Algorithm | 2010-03-05 | Paper |
Factoring \(pq ^{2}\) with quadratic forms: Nice cryptanalyses Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
How Risky Is the Random-Oracle Model? Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures Journal of Cryptology | 2009-05-08 | Paper |
| Public-key cryptanalysis | 2009-03-16 | Paper |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
| Finding short lattice vectors within Mordell's inequality | 2009-01-05 | Paper |
Sieve algorithms for the shortest vector problem are practical Journal of Mathematical Cryptology | 2008-11-07 | Paper |
Floating-Point LLL Revisited Lecture Notes in Computer Science | 2008-05-06 | Paper |
Predicting Lattice Reduction Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Adapting Density Attacks to Low-Weight Knapsacks Lecture Notes in Computer Science | 2008-03-18 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
Testing set proportionality and the Ádám isomorphism of circulant graphs Journal of Discrete Algorithms | 2007-11-05 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Symplectic Lattice Reduction and NTRU Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
New Chosen-Ciphertext Attacks on NTRU Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Rankin’s Constant and Blockwise Lattice Reduction Lecture Notes in Computer Science | 2007-09-04 | Paper |
Algorithmic Number Theory Lecture Notes in Computer Science | 2007-05-02 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
| Noisy polynomial interpolation and noisy Chinese remaindering | 2006-03-01 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Algorithmic Number Theory Lecture Notes in Computer Science | 2005-08-12 | Paper |
| scientific article; zbMATH DE number 2085214 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2081056 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2079927 (Why is no real title available?) | 2004-08-03 | Paper |
The insecurity of the elliptic curve digital signature algorithm with partially known nonces Designs, Codes and Cryptography | 2003-11-10 | Paper |
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1942422 (Why is no real title available?) | 2003-06-30 | Paper |
Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation Mathematics of Computation | 2003-05-14 | Paper |
| scientific article; zbMATH DE number 1852142 (Why is no real title available?) | 2003-01-09 | Paper |
| scientific article; zbMATH DE number 1852139 (Why is no real title available?) | 2003-01-09 | Paper |
The insecurity of the digital signature algorithm with partially known nonces Journal of Cryptology | 2002-12-01 | Paper |
| scientific article; zbMATH DE number 1302849 (Why is no real title available?) | 2002-05-05 | Paper |
| scientific article; zbMATH DE number 1643920 (Why is no real title available?) | 2002-02-28 | Paper |
| scientific article; zbMATH DE number 1688999 (Why is no real title available?) | 2002-01-09 | Paper |
| scientific article; zbMATH DE number 1588484 (Why is no real title available?) | 2001-07-17 | Paper |
| scientific article; zbMATH DE number 1588483 (Why is no real title available?) | 2001-07-17 | Paper |
| scientific article; zbMATH DE number 1583767 (Why is no real title available?) | 2001-07-03 | Paper |
| scientific article; zbMATH DE number 1583766 (Why is no real title available?) | 2001-07-03 | Paper |
| scientific article; zbMATH DE number 1418285 (Why is no real title available?) | 2000-07-26 | Paper |
| scientific article; zbMATH DE number 1304120 (Why is no real title available?) | 2000-03-07 | Paper |
| scientific article; zbMATH DE number 1302807 (Why is no real title available?) | 2000-02-15 | Paper |
| scientific article; zbMATH DE number 1341877 (Why is no real title available?) | 1999-11-29 | Paper |
| scientific article; zbMATH DE number 1088235 (Why is no real title available?) | 1998-03-10 | Paper |