Joana Treger
From MaRDI portal
Person:2889754
List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Key-recovery attack on the \(\mathsf {ASASA}\) cryptosystem with expanding S-boxes Lecture Notes in Computer Science | 2015-12-10 | Paper |
| A robust and plaintext-aware variant of signed ElGamal encryption Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
| Increasing block sizes using Feistel networks: the example of the AES Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
| A family of weak keys in HFE and the corresponding practical key-recovery Journal of Mathematical Cryptology | 2012-03-22 | Paper |
| Cryptanalysis of the hidden matrix cryptosystem Lecture Notes in Computer Science | 2010-08-31 | Paper |
| Generic attacks on misty schemes Lecture Notes in Computer Science | 2010-08-31 | Paper |
| Generic Attacks on Feistel Networks with Internal Permutations Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Research outcomes over time
This page was built for person: Joana Treger