| Publication | Date of Publication | Type |
|---|
We are on the same side. Alternative sieving strategies for the number field sieve | 2024-09-13 | Paper |
Computing \(e\)-th roots in number fields | 2024-05-29 | Paper |
Masking the GLP lattice-based signature scheme at any order Journal of Cryptology | 2024-01-23 | Paper |
A generic transform from multi-round interactive proof to NIZK Lecture Notes in Computer Science | 2023-11-16 | Paper |
Revisiting related-key boomerang attacks on AES using computer-aided tool Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Computing $e$-th roots in number fields | 2023-05-27 | Paper |
Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\) | 2022-11-09 | Paper |
Fast reduction of algebraic lattices over cyclotomic fields | 2022-11-09 | Paper |
\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} | 2022-08-30 | Paper |
Towards faster polynomial-time lattice reduction | 2022-04-22 | Paper |
SSE and SSD: page-efficient searchable symmetric encryption | 2022-04-22 | Paper |
Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices | 2021-12-01 | Paper |
Multi-device for Signal | 2021-02-23 | Paper |
Linearly equivalent s-boxes and the division property Designs, Codes and Cryptography | 2020-10-07 | Paper |
Masking Dilithium. Efficient implementation and side-channel evaluation | 2020-01-30 | Paper |
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond | 2019-12-10 | Paper |
Variants of the AES key schedule for better truncated differential bounds | 2019-02-20 | Paper |
Close to Uniform Prime Number Generation With Fewer Random Bits IEEE Transactions on Information Theory | 2019-01-28 | Paper |
Pattern matching on encrypted streams | 2018-12-20 | Paper |
LWE without modular reduction and improved side-channel attacks against BLISS | 2018-12-20 | Paper |
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols IEEE Transactions on Computers | 2018-12-04 | Paper |
Key-recovery attacks on \(\mathsf{ASASA}\) Journal of Cryptology | 2018-09-14 | Paper |
Fast lattice-based encryption: stretching SPRING | 2018-09-12 | Paper |
Masking the GLP lattice-based signature scheme at any order | 2018-07-09 | Paper |
Practical implementation of Ring-SIS/LWE based signature and IBE | 2018-06-22 | Paper |
Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures | 2018-02-16 | Paper |
Improved side-channel analysis of finite-field multiplication | 2018-02-14 | Paper |
Revisiting Lattice Attacks on Overstretched NTRU Parameters Lecture Notes in Computer Science | 2017-06-13 | Paper |
Computing generator in cyclotomic integer rings. A subfield algorithm for the principal ideal problem in \(L_{|\varDelta_\mathbb {K}|}\left(\frac{1}{2}\right)\) and application to the cryptanalysis of a FHE scheme Lecture Notes in Computer Science | 2017-06-13 | Paper |
Low-Data Complexity Attacks on AES IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Efficient and Provable White-Box Primitives Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Automatic search of meet-in-the-middle and impossible differential attacks Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
New second-preimage attacks on hash functions Journal of Cryptology | 2016-10-13 | Paper |
Assisted identification of mode of operation in binary code with dynamic data flow slicing Applied Cryptography and Network Security | 2016-10-04 | Paper |
Tightly secure signatures from lossy identification schemes Journal of Cryptology | 2016-09-21 | Paper |
Cryptanalysis of the new CLT multilinear map over the integers Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Homomorphic evaluation of lattice-based symmetric encryption schemes Lecture Notes in Computer Science | 2016-09-02 | Paper |
Safe-errors on SPA protected implementations with the atomicity technique The New Codebreakers | 2016-05-02 | Paper |
Binary elligator squared Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Diffusion matrices from algebraic-geometry codes with efficient SIMD implementation Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Key-recovery attacks on \(\mathsf {ASASA}\) Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Practical multi-candidate election system Proceedings of the twentieth annual ACM symposium on Principles of distributed computing | 2016-03-04 | Paper |
An improved BKW algorithm for LWE with applications to cryptography and lattices Lecture Notes in Computer Science | 2015-12-10 | Paper |
Cryptanalysis of the co-ACD assumption Lecture Notes in Computer Science | 2015-12-10 | Paper |
Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE Lecture Notes in Computer Science | 2015-12-10 | Paper |
Verified Proofs of Higher-Order Masking Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks Fast Software Encryption | 2015-09-18 | Paper |
Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES Fast Software Encryption | 2015-09-18 | Paper |
Making RSA–PSS Provably Secure against Non-random Faults Advanced Information Systems Engineering | 2015-07-21 | Paper |
Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE Lecture Notes in Computer Science | 2015-01-16 | Paper |
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias Lecture Notes in Computer Science | 2015-01-16 | Paper |
Side-Channel Analysis of Multiplications in GF(2128) Lecture Notes in Computer Science | 2015-01-06 | Paper |
Statistical properties of short RSA distribution and their cryptographic applications Lecture Notes in Computer Science | 2014-09-26 | Paper |
Faster chosen-key distinguishers on reduced-round AES Lecture Notes in Computer Science | 2014-08-20 | Paper |
Close to uniform prime number generation with fewer random bits Automata, Languages, and Programming | 2014-07-01 | Paper |
Recovering private keys generated with weak PRNGs Cryptography and Coding | 2014-01-17 | Paper |
Security amplification against meet-in-the-middle attacks using whitening Cryptography and Coding | 2014-01-17 | Paper |
Leakage-resilient symmetric encryption via re-keying Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128 Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Injective encodings to elliptic curves Information Security and Privacy | 2013-06-28 | Paper |
Time/memory/data tradeoffs for variants of the RSA problem Lecture Notes in Computer Science | 2013-06-11 | Paper |
Graph-theoretic algorithms for the ``isomorphism of polynomials problem Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Improved key recovery attacks on reduced-round AES in the single-key setting Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Meet-in-the-middle attack on reduced versions of the Camellia block cipher Advances in Information and Computer Security | 2013-04-04 | Paper |
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves Mathematics of Computation | 2013-03-20 | Paper |
Timing attack against protected RSA-CRT implementation used in PolarSSL Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Attacking RSA-CRT signatures with faults on Montgomery multiplication Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Indifferentiable hashing to Barreto-Naehrig curves Progress in Cryptology – LATINCRYPT 2012 | 2012-09-21 | Paper |
Tightly-secure signatures from lossy identification schemes Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
New insights on impossible differential cryptanalysis Selected Areas in Cryptography | 2012-06-08 | Paper |
A family of weak keys in HFE and the corresponding practical key-recovery Journal of Mathematical Cryptology | 2012-03-22 | Paper |
Practical Key-Recovery for All Possible Parameters of SFLASH Lecture Notes in Computer Science | 2011-12-02 | Paper |
Automatic search of attacks on round-reduced AES and applications Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function Fast Software Encryption | 2011-07-07 | Paper |
Cryptocomputing with rationals Financial Cryptography | 2011-04-20 | Paper |
Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Attacks on hash functions based on Generalized Feistel: application to reduced-round \textit{Lesamnta} and \textit{SHAvite-3}\(_{512}\) Selected Areas in Cryptography | 2011-03-15 | Paper |
Security analysis of SIMD Selected Areas in Cryptography | 2011-03-15 | Paper |
Deterministic encoding and hashing to odd hyperelliptic curves Lecture Notes in Computer Science | 2010-11-26 | Paper |
Estimating the size of the image of deterministic hash functions to elliptic curves Lecture Notes in Computer Science | 2010-08-31 | Paper |
Another look at complementation properties Fast Software Encryption | 2010-07-13 | Paper |
On some incompatible properties of voting schemes Towards Trustworthy Elections | 2010-06-17 | Paper |
The doubling attack -- why upwards is better than downwards. Lecture Notes in Computer Science | 2010-03-09 | Paper |
Attacking unbalanced RSA-CRT using SPA. Lecture Notes in Computer Science | 2010-03-09 | Paper |
The insecurity of Esign in practical implementations Lecture Notes in Computer Science | 2010-01-05 | Paper |
Practical symmetric on-line encryption. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Cryptanalysis of Tweaked Versions of SMASH and Reparation Selected Areas in Cryptography | 2009-11-03 | Paper |
Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques Selected Areas in Cryptography | 2009-11-03 | Paper |
Optimal Randomness Extraction from a Diffie-Hellman Element Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Practical Cryptanalysis of SFLASH Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
An Improved LPN Algorithm Lecture Notes in Computer Science | 2008-11-27 | Paper |
Power Attack on Small RSA Public Exponent Lecture Notes in Computer Science | 2008-08-29 | Paper |
Differential Cryptanalysis for Multivariate Schemes Lecture Notes in Computer Science | 2008-05-06 | Paper |
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Second Preimage Attacks on Dithered Hash Functions Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Key Recovery on Hidden Monomial Multivariate Schemes Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
A Simple Threshold Authenticated Key Exchange from Short Secrets Lecture Notes in Computer Science | 2008-03-18 | Paper |
Total Break of the ℓ-IC Signature Scheme Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Cryptanalysis of SFLASH with Slightly Modified Parameters Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes Automata, Languages and Programming | 2007-09-11 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
scientific article; zbMATH DE number 2081073 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2081075 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2009974 (Why is no real title available?) | 2003-11-26 | Paper |
scientific article; zbMATH DE number 1759349 (Why is no real title available?) | 2002-11-28 | Paper |
scientific article; zbMATH DE number 1618057 (Why is no real title available?) | 2002-09-11 | Paper |