| Publication | Date of Publication | Type |
|---|
| Algorithmic views of vectorized polynomial multipliers -- NTRU | 2024-10-23 | Paper |
| Certified verification for algebraic abstraction | 2024-02-01 | Paper |
| \textsc{CoqCryptoLine}: a verified model checker with certified results | 2024-01-12 | Paper |
| Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms | 2023-01-18 | Paper |
A physical study of the LLL algorithm Journal of Number Theory | 2023-01-12 | Paper |
| CoqQFBV: a scalable certified SMT quantifier-free bit-vector solver | 2022-03-25 | Paper |
| Verifying post-quantum signatures in 8 kB of RAM | 2022-03-22 | Paper |
| The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes | 2021-12-08 | Paper |
| scientific article; zbMATH DE number 7378548 (Why is no real title available?) | 2021-08-04 | Paper |
A physical study of the LLL algorithm (available as arXiv preprint) | 2021-06-03 | Paper |
Frobenius additive fast Fourier transform Proceedings of the 2018 ACM International Symposium on Symbolic and Algebraic Computation | 2020-09-09 | Paper |
| HMFEv -- an efficient multivariate signature scheme | 2018-09-12 | Paper |
| Asymptotically faster quantum algorithms to solve multivariate quadratic equations | 2018-06-22 | Paper |
| Implementing Joux-Vitse's crossbred algorithm for solving \(\mathcal M\mathcal Q\) systems over \(\mathbb F_2\) on GPUs | 2018-06-22 | Paper |
| Faster Multiplication for Long Binary Polynomials | 2017-08-31 | Paper |
Gauss sieve algorithm on GPUs Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Design Principles for HFEv- Based Multivariate Signature Schemes Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
A practical attack on patched MIFARE Classic Information Security and Cryptology | 2015-12-02 | Paper |
Fast exhaustive search for quadratic systems in \(\mathbb {F}_2\) on FPGAs Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Tuning GaussSieve for speed Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
Hydra: an energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics Advances in Information and Computer Security | 2015-05-27 | Paper |
Operating degrees for XL vs. \(F_{4}/F_{5}\) for generic \(\mathcal{M}Q\) with number of equations linear in that of variables Lecture Notes in Computer Science | 2013-12-10 | Paper |
Degree of regularity for HFEV and HFEV-- Post-Quantum Cryptography | 2013-06-14 | Paper |
Solving quadratic equations with XL on parallel architectures Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Probabilistically correct secure arithmetic computation for modular conversion, zero test, comparison, MOD and exponentiation Lecture Notes in Computer Science | 2012-09-25 | Paper |
SHA-3 on ARM11 processors Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Public-key cryptography from new multivariate quadratic assumptions Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
High-speed high-security signatures Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
ECC2K-130 on NVIDIA GPUs Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Efficient string-commitment from weak bit-commitment Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\) Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
SSE Implementation of Multivariate PKCs on Modern x86 CPUs Lecture Notes in Computer Science | 2009-11-10 | Paper |
ECM on Graphics Cards Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Square, a New Multivariate Encryption Scheme Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Multivariate Public Key Cryptography Post-Quantum Cryptography | 2009-03-12 | Paper |
Multivariates Polynomials for Hashing Information Security and Cryptology | 2009-02-10 | Paper |
Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$ Post-Quantum Cryptography | 2008-11-11 | Paper |
Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives Post-Quantum Cryptography | 2008-11-11 | Paper |
Analysis of QUAD Fast Software Encryption | 2008-09-16 | Paper |
A Crowning Moment for Wiener Indices Studies in Applied Mathematics | 2008-09-01 | Paper |
Could SFLASH be Repaired? Automata, Languages and Programming | 2008-08-19 | Paper |
New Differential-Algebraic Attacks and Reparametrization of Rainbow Applied Cryptography and Network Security | 2008-06-13 | Paper |
All in the XL Family: Theory and Practice Lecture Notes in Computer Science | 2008-03-17 | Paper |
Generalized Wiener indices of zigzagging pentachains Journal of Mathematical Chemistry | 2007-10-12 | Paper |
ℓ-Invertible Cycles for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic ( ${\mathcal{MQ}}$ ) Public Key Cryptography Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
The behavior of Wiener indices and polynomials of graphs under five graph decorations Applied Mathematics Letters | 2007-06-29 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
| scientific article; zbMATH DE number 2079567 (Why is no real title available?) | 2004-07-28 | Paper |
Presorting algorithms: an average-case point of view Theoretical Computer Science | 2000-08-21 | Paper |
From ternary strings to Wiener indices of benzenoid chains Discrete Applied Mathematics | 1997-05-29 | Paper |
| scientific article; zbMATH DE number 978625 (Why is no real title available?) | 1997-04-06 | Paper |
Wiener indices of hex carpets---from hexagon models to square grids Southeast Asian Bulletin of Mathematics | 1996-07-18 | Paper |
Zigging and zagging in pentachains Advances in Applied Mathematics | 1995-07-26 | Paper |