| Publication | Date of Publication | Type |
|---|
CryptAttackTester: high-assurance attack analysis | 2024-12-13 | Paper |
Fast norm computation in smooth-degree abelian number fields Research in Number Theory | 2024-01-04 | Paper |
A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack Lecture Notes in Computer Science | 2023-08-14 | Paper |
Montgomery Curves and the Montgomery Ladder Topics in Computational Number Theory Inspired by Peter L. Montgomery | 2023-04-21 | Paper |
Sliding right into disaster: left-to-right sliding windows leak Lecture Notes in Computer Science | 2020-06-24 | Paper |
Decisional second-preimage resistance: when does SPR imply PRE? | 2020-05-11 | Paper |
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies | 2020-02-06 | Paper |
A low-resource quantum factoring algorithm | 2018-09-12 | Paper |
Post-quantum RSA | 2018-09-12 | Paper |
HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction | 2018-07-17 | Paper |
Asymptotically faster quantum algorithms to solve multivariate quadratic equations | 2018-06-22 | Paper |
Low-communication parallel quantum multi-target preimage search | 2018-04-26 | Paper |
NTRU prime: reducing attack surface at low cost | 2018-04-26 | Paper |
Short generators without quantum computers: the case of multiquadratics Lecture Notes in Computer Science | 2017-06-13 | Paper |
Hash-Function Based PRFs: AMAC and Its Multi-User Security Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Dual EC: a standardized back door The New Codebreakers | 2016-05-02 | Paper |
Faster binary-field multiplication and faster binary-field macs Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Batch NFS Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Bad directions in cryptographic hash functions Information Security and Privacy | 2015-10-20 | Paper |
scientific article; zbMATH DE number 6488034 (Why is no real title available?) | 2015-10-01 | Paper |
SPHINCS: practical stateless hash-based signatures Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
TweetNaCl: A Crypto Library in 100 Tweets Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
Twisted Hessian curves Progress in Cryptology -- LATINCRYPT 2015 | 2015-09-17 | Paper |
Curve41417: Karatsuba revisited Advanced Information Systems Engineering | 2015-07-21 | Paper |
Kummer strikes back: new DH speed records Lecture Notes in Computer Science | 2015-01-16 | Paper |
Hyper-and-elliptic-curve cryptography LMS Journal of Computation and Mathematics | 2014-09-05 | Paper |
Faster batch forgery identification Lecture Notes in Computer Science | 2014-08-20 | Paper |
SipHash: a fast short-input PRF Lecture Notes in Computer Science | 2014-08-20 | Paper |
Computing small discrete logarithms faster Lecture Notes in Computer Science | 2014-08-20 | Paper |
Non-uniform cracks in the concrete: the power of free precomputation Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Factoring RSA keys from certified smart cards: Coppersmith in the wild Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Never Trust a Bunny Radio Frequency Identification. Security and Privacy Issues | 2013-11-19 | Paper |
McBits: fast constant-time code-based cryptography Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
Quantum algorithms for the subset-sum problem Post-Quantum Cryptography | 2013-06-14 | Paper |
ECM using Edwards curves Mathematics of Computation | 2013-03-20 | Paper |
The security impact of a new cryptographic library Progress in Cryptology – LATINCRYPT 2012 | 2012-09-21 | Paper |
Wild McEliece Incognito Post-Quantum Cryptography | 2011-11-25 | Paper |
Simplified High-Speed High-Distance List Decoding for Alternant Codes Post-Quantum Cryptography | 2011-11-25 | Paper |
High-speed high-security signatures Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
Smaller decoding exponents: ball-collision decoding Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Really fast syndrome-based hashing Lecture Notes in Computer Science | 2011-06-29 | Paper |
List Decoding for Binary Goppa Codes Lecture Notes in Computer Science | 2011-06-08 | Paper |
Faster 2-regular information-set decoding Lecture Notes in Computer Science | 2011-06-08 | Paper |
A complete set of addition laws for incomplete Edwards curves Journal of Number Theory | 2011-04-08 | Paper |
Wild McEliece Selected Areas in Cryptography | 2011-03-15 | Paper |
On the correct use of the negation map in the Pollard rho method Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
ECC2K-130 on NVIDIA GPUs Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Starfish on strike Lecture Notes in Computer Science | 2010-08-31 | Paper |
Type-II optimal polynomial bases Arithmetic of Finite Fields | 2010-07-20 | Paper |
Grover vs. McEliece Post-Quantum Cryptography | 2010-06-17 | Paper |
FSBday Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Batch Binary Edwards Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Analysis and optimization of elliptic-curve single-scalar multiplication | 2009-07-06 | Paper |
ECM on Graphics Cards Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Fast multiplication and its applications | 2009-03-24 | Paper |
scientific article; zbMATH DE number 5532109 (Why is no real title available?) | 2009-03-24 | Paper |
scientific article; zbMATH DE number 5532112 (Why is no real title available?) | 2009-03-24 | Paper |
Introduction to post-quantum cryptography Post-Quantum Cryptography | 2009-03-12 | Paper |
New AES Software Speed Records Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Attacking and Defending the McEliece Cryptosystem Post-Quantum Cryptography | 2008-11-11 | Paper |
Analysis of QUAD Fast Software Encryption | 2008-09-16 | Paper |
Twisted Edwards Curves Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Faster Addition and Doubling on Elliptic Curves Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators Lecture Notes in Computer Science | 2008-05-06 | Paper |
Inverted Edwards Coordinates Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2008-04-17 | Paper |
The Tangent FFT Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2008-04-17 | Paper |
Proving Tight Security for Rabin-Williams Signatures Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication Lecture Notes in Computer Science | 2008-04-11 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Proving primality in essentially quartic random time Mathematics of Computation | 2007-02-02 | Paper |
Modular exponentiation via the explicit Chinese remainder theorem Mathematics of Computation | 2007-02-02 | Paper |
Detecting perfect powers by factoring into coprimes Mathematics of Computation | 2007-02-02 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Sharper \(ABC\)-based bounds for congruent polynomials Journal de Théorie des Nombres de Bordeaux | 2006-03-30 | Paper |
scientific article; zbMATH DE number 2154272 (Why is no real title available?) | 2005-04-08 | Paper |
Factoring into coprimes in essentially linear time Journal of Algorithms | 2005-02-22 | Paper |
Prime sieves using binary quadratic forms Mathematics of Computation | 2004-02-12 | Paper |
scientific article; zbMATH DE number 1996321 (Why is no real title available?) | 2003-12-08 | Paper |
Enumerating solutions to 𝑝(𝑎)+𝑞(𝑏)=𝑟(𝑐)+𝑠(𝑑) Mathematics of Computation | 2000-11-22 | Paper |
How to stretch random functions: The security of protected counter sums Journal of Cryptology | 2000-06-06 | Paper |
Composing power series over a finite ring in essentially linear time Journal of Symbolic Computation | 1999-10-12 | Paper |
scientific article; zbMATH DE number 1186936 (Why is no real title available?) | 1999-04-08 | Paper |
scientific article; zbMATH DE number 1113822 (Why is no real title available?) | 1998-09-07 | Paper |
Detecting perfect powers in essentially linear time Mathematics of Computation | 1998-06-14 | Paper |
The 3x+ 1 Conjugacy Map Canadian Journal of Mathematics | 1997-07-07 | Paper |
A Non-Iterative 2-Adic Statement of the 3N + 1 Conjecture Proceedings of the American Mathematical Society | 1995-01-03 | Paper |
scientific article; zbMATH DE number 475436 (Why is no real title available?) | 1994-01-13 | Paper |