Håvard Raddum

From MaRDI portal
(Redirected from Person:269573)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The algebraic FreeLunch: efficient Gröbner basis attacks against arithmetization-oriented primitives2024-12-13Paper
Analysis of multivariate encryption schemes: application to Dob and \(C^*\)
Journal of Cryptology
2024-05-13Paper
Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
FASTA -- a stream cipher for fast FHE evaluation2022-07-06Paper
Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath2022-03-25Paper
A practical adaptive key recovery attack on the LGM (GSW-like) cryptosystem2022-03-22Paper
Analysis of multivariate encryption schemes: application to Dob2021-12-21Paper
Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-22021-12-08Paper
Solving non-linear Boolean equation systems by variable elimination
Applicable Algebra in Engineering, Communication and Computing
2021-06-11Paper
Cryptanalysis of the multivariate encryption scheme EFLASH2020-08-05Paper
Factorization using binary decision diagrams
Cryptography and Communications
2019-05-15Paper
Faster key recovery attack on round-reduced PRINCE
Lecture Notes in Computer Science
2019-01-30Paper
Security notions for cloud storage and deduplication2018-11-07Paper
MRHS solver based on linear algebra and exhaustive search
Journal of Mathematical Cryptology
2018-10-04Paper
Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN
Tatra Mountains Mathematical Publications
2017-03-29Paper
Cryptanalysis of PRINCE with minimal data
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
Influence of addition modulo \(2^n\) on algebraic attacks
Cryptography and Communications
2016-04-19Paper
Algebraic attacks using binary decision diagrams
Cryptography and Information Security in the Balkans
2015-09-21Paper
Algebraic analysis of the Simon block cipher family
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
Analysis of Trivium using compressed right hand side equations
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Solving compressed right hand side equation systems with linear absorption
Lecture Notes in Computer Science
2012-09-07Paper
The Zodiac killer ciphers
Tatra Mountains Mathematical Publications
2010-10-14Paper
Solving equation systems by agreeing and learning
Arithmetic of Finite Fields
2010-07-20Paper
Cryptanalysis of IDEA-X/2.
Lecture Notes in Computer Science
2010-01-05Paper
Solving multiple right hand sides linear equations
Designs, Codes and Cryptography
2009-03-31Paper
An Analysis of the Hermes8 Stream Ciphers
Information Security and Privacy
2009-03-06Paper
On the Number of Linearly Independent Equations Generated by XL
Sequences and Their Applications - SETA 2008
2009-02-10Paper
Bit-Pattern Based Integral Attack
Fast Software Encryption
2008-09-18Paper
MRHS Equation Systems
Selected Areas in Cryptography
2008-03-25Paper
Advanced Encryption Standard – AES
Lecture Notes in Computer Science
2005-09-14Paper
scientific article; zbMATH DE number 2085205 (Why is no real title available?)2004-08-09Paper
On the computation of coset leaders with high Hamming weight.
Discrete Mathematics
2004-01-26Paper


Research outcomes over time


This page was built for person: Håvard Raddum