| Publication | Date of Publication | Type |
|---|
| Reduction from sparse LPN to LPN, dual attack 3.0 | 2024-11-13 | Paper |
| A polynomial time key-recovery attack on the Sidon cryptosystem | 2024-10-14 | Paper |
| A new approach based on quadratic forms to attack the McEliece cryptosystem | 2024-09-13 | Paper |
| Rigorous foundations for dual attacks in coding theory | 2024-08-15 | Paper |
| Polynomial time key-recovery attack on high rate random alternant codes | 2024-07-23 | Paper |
| Quantum reduction of finding short code vectors to the decoding problem | 2024-07-23 | Paper |
| Smoothing codes and lattices: systematic study and new bounds | 2024-07-19 | Paper |
| Block codes for dyadic phase shift keying | 2024-07-05 | Paper |
| Time and Query Complexity Tradeoffs for the Dihedral Coset Problem | 2024-04-26 | Paper |
| Revisiting algebraic attacks on MinRank and on the rank decoding problem | 2023-11-07 | Paper |
| Statistical decoding 2.0: reducing decoding to LPN | 2023-08-21 | Paper |
| On the dimension and structure of the square of the dual of a Goppa code | 2023-04-12 | Paper |
| Improvements of algebraic attacks for solving the rank decoding and MinRank problems | 2023-03-21 | Paper |
| An algebraic attack on rank metric code-based cryptosystems | 2021-12-01 | Paper |
| On the dimension and structure of the square of the dual of a Goppa code | 2021-11-25 | Paper |
| Wave: a new family of trapdoor one-way preimage sampleable functions based on codes | 2020-05-20 | Paper |
| Recovering short secret keys of RLCE in polynomial time | 2020-02-25 | Paper |
| Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems | 2020-02-14 | Paper |
| Identifying an unknown code by partial Gaussian elimination | 2019-02-20 | Paper |
| Two attacks on rank metric code-based schemes: RankSign and an IBE scheme | 2018-12-20 | Paper |
| Quantum information set decoding algorithms | 2018-09-12 | Paper |
| Recovering short secret keys of RLCE in polynomial time | 2018-05-29 | Paper |
| CAKE: CODE-based algorithm for key encapsulation | 2018-04-20 | Paper |
| The action of a few random permutations on r-tuples and an application to cryptography | 2017-11-16 | Paper |
| Identity-based encryption from codes with rank metric | 2017-10-27 | Paper |
| Quantum Serial Turbo Codes | 2017-08-08 | Paper |
| A Distinguisher for High-Rate McEliece Cryptosystems | 2017-06-08 | Paper |
| Quantum LDPC Codes With Positive Rate and Minimum Distance Proportional to the Square Root of the Blocklength | 2017-06-08 | Paper |
| Polynomial Time Attack on Wild McEliece Over Quadratic Extensions | 2017-05-02 | Paper |
| Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups | 2017-04-28 | Paper |
| Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes | 2016-04-26 | Paper |
| An Efficient Attack on a Code-Based Signature Scheme | 2016-04-26 | Paper |
| RankSynd a PRNG Based on Rank Metric | 2016-04-26 | Paper |
| Structural cryptanalysis of McEliece schemes with compact keys | 2016-04-05 | Paper |
| A Polynomial-Time Attack on the BBCRS Scheme | 2015-08-27 | Paper |
| New identities relating wild Goppa codes | 2014-09-02 | Paper |
| Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes | 2014-08-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5495951 | 2014-08-07 | Paper |
| Polynomial Time Attack on Wild McEliece over Quadratic Extensions | 2014-05-27 | Paper |
| An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes | 2013-06-14 | Paper |
| An Efficient Attack on All Concrete KKS Proposals | 2011-11-25 | Paper |
| Accurate estimates of the data complexity and success probability for various cryptanalyses | 2011-04-08 | Paper |
| Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes | 2011-02-19 | Paper |
| Ramanujan graphs of very large girth based on octonions | 2010-11-11 | Paper |
| Algebraic Cryptanalysis of McEliece Variants with Compact Keys | 2010-06-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5188228 | 2010-03-10 | Paper |
| On Linear Cryptanalysis with Many Linear Approximations | 2010-01-07 | Paper |
| Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security | 2009-04-29 | Paper |
| Computing the Algebraic Immunity Efficiently | 2009-04-02 | Paper |
| The Gaussian Isoperimetric Inequality and Decoding Error Probabilities for the Gaussian Channel | 2008-12-21 | Paper |
| Collisions for the LPS Expander Graph Hash Function | 2008-04-15 | Paper |
| Generalized Alon--Boppana Theorems and Error-Correcting Codes | 2006-06-01 | Paper |
| Spectral estimates for abelian Cayley graphs | 2006-01-10 | Paper |
| Wave equations for graphs and the edge-based Laplacian | 2005-02-24 | Paper |
| New spectral lower bounds on the bisection width of graphs | 2004-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4474239 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4801077 | 2003-04-06 | Paper |
| Discrete isoperimetric inequalities and the probability of a decoding error | 2003-01-13 | Paper |
| Laplacian eigenvalues and distances between subsets of a manifold | 2002-08-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2766666 | 2002-07-22 | Paper |
| Edge isoperimetric inequalities for product graphs | 2001-04-26 | Paper |
| On the dual distance and the gap of a binary code | 2000-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4954415 | 2000-06-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945357 | 2000-03-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4940678 | 2000-03-01 | Paper |
| The action of a few permutations onr-tuples is quickly transitive | 1999-12-19 | Paper |
| The spectrum of de Bruijn and Kautz graphs | 1998-10-27 | Paper |
| Optimal Cycle Codes Constructed From Ramanujan Graphs | 1998-02-09 | Paper |
| Eigenvalues, eigenspaces and distances to subsets | 1998-01-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4228742 | 1995-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5567746 | 1966-01-01 | Paper |