Publication | Date of Publication | Type |
---|
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS | 2023-05-26 | Paper |
A new decryption failure attack against HQC | 2023-03-21 | Paper |
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM | 2022-11-09 | Paper |
Making the BKW algorithm practical for LWE | 2022-07-06 | Paper |
Grain-128AEADv2: strengthening the initialization against key reconstruction | 2022-06-29 | Paper |
Revisiting the Concrete Security of Goldreich’s Pseudorandom Generator | 2022-02-17 | Paper |
A novel CCA attack using decryption errors against LAC | 2020-05-20 | Paper |
Solving LPN using covering codes | 2020-03-03 | Paper |
Decryption failure attacks on IND-CCA secure lattice-based schemes | 2020-01-28 | Paper |
An AEAD variant of the Grain stream cipher | 2019-10-14 | Paper |
Some cryptanalytic and coding-theoretic applications of a soft Stern algorithm | 2019-09-19 | Paper |
On the Asymptotics of Solving the LWE Problem Using Coded-BKW With Sieving | 2019-07-19 | Paper |
A new birthday-type algorithm for attacking the fresh re-keying countermeasure | 2019-04-26 | Paper |
A Key Recovery Reaction Attack on QC-MDPC | 2019-03-28 | Paper |
A reaction attack on the QC-LDPC McEliece cryptosystem | 2018-09-12 | Paper |
Coded-BKW with sieving | 2018-04-06 | Paper |
Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials | 2017-06-08 | Paper |
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial | 2017-04-28 | Paper |
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors | 2017-02-01 | Paper |
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension | 2016-09-08 | Paper |
Coded-BKW: Solving LWE Using Lattice Codes | 2015-12-10 | Paper |
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings | 2015-11-11 | Paper |
A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences | 2015-01-23 | Paper |
Solving LPN Using Covering Codes | 2015-01-16 | Paper |
Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x\) and some cryptographic applications] | 2014-08-18 | Paper |
Linear Attacks on Stream Ciphers | 2014-08-07 | Paper |
An efficient state recovery attack on the X-FCSR family of stream ciphers | 2014-04-01 | Paper |
A survey on fast correlation attacks | 2013-06-24 | Paper |
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time | 2012-09-21 | Paper |
Analysis of Xorrotation with Application to an HC-128 Variant | 2012-09-07 | Paper |
Improved distinguishers for HC-128 | 2012-03-23 | Paper |
Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere | 2011-12-16 | Paper |
On Equivalence Classes of Boolean Functions | 2011-10-27 | Paper |
A Note on Fast Algebraic Attacks and Higher Order Nonlinearities | 2011-07-29 | Paper |
An overview of distinguishing attacks on stream ciphers | 2009-10-26 | Paper |
An Efficient State Recovery Attack on X-FCSR-256 | 2009-08-11 | Paper |
Cryptanalysis of Achterbahn | 2009-04-02 | Paper |
Breaking the F-FCSR-H Stream Cipher in Real Time | 2009-02-10 | Paper |
Two New Attacks on the Self-Shrinking Generator | 2008-12-21 | Paper |
A Linear Distinguishing Attack on Scream | 2008-12-21 | Paper |
Two General Attacks on Pomaranch-Like Keystream Generators | 2008-09-16 | Paper |
A Key Recovery Attack on Edon80 | 2008-05-15 | Paper |
A Framework for Chosen IV Statistical Analysis of Stream Ciphers | 2008-04-11 | Paper |
Fast Computation of Large Distributions and Its Cryptographic Applications | 2008-03-18 | Paper |
Cryptanalysis of Achterbahn-Version 2 | 2007-11-29 | Paper |
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2 | 2007-11-29 | Paper |
Cryptography and Coding | 2007-11-28 | Paper |
Selected Areas in Cryptography | 2006-10-10 | Paper |
Selected Areas in Cryptography | 2006-10-10 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
Fast Software Encryption | 2005-12-27 | Paper |
Another attack on A5/1 | 2005-05-31 | Paper |
A construction of resilient functions with high nonlinearity | 2005-05-31 | Paper |
Theoretical analysis of a correlation attack based on convolutional codes | 2005-05-11 | Paper |
On the complexity of some cryptographic problems based on the general decoding problem | 2005-05-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q3046357 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434884 | 2003-11-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4417409 | 2003-07-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413853 | 2003-07-21 | Paper |
Further results on asymmetric authentication schemes | 2003-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4537991 | 2002-11-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536809 | 2002-10-07 | Paper |
A fast correlation attack on LILI-128 | 2002-07-14 | Paper |
Almost \(k\)-wise independent sample spaces and their cryptologic applications | 2002-01-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q2741405 | 2001-10-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941855 | 2001-02-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945349 | 2000-03-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249278 | 2000-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4934703 | 2000-01-31 | Paper |
A simple one-sweep algorithm for optimal APP symbol decoding of linear block codes | 1999-11-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250772 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365767 | 1998-06-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341759 | 1997-09-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341758 | 1997-06-18 | Paper |
On the cardinality of systematic authentication codes via error-correcting codes | 1997-01-28 | Paper |
Authentication codes for nontrusting parties obtained from rank metric codes | 1995-12-20 | Paper |
Lower bounds on the probability of deception in authentication with arbitration | 1995-03-01 | Paper |
A shift register construction of unconditionally secure authentication codes | 1994-06-26 | Paper |