| Publication | Date of Publication | Type |
|---|
An algebraic algorithm for breaking NTRU with multiple keys Designs, Codes and Cryptography | 2024-12-11 | Paper |
| Concrete analysis of quantum lattice enumeration | 2024-08-30 | Paper |
The group factorization problem in finite groups of Lie type Information Processing Letters | 2024-06-07 | Paper |
Fiat-Shamir signatures based on module-NTRU Information Security and Privacy | 2023-07-26 | Paper |
| Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\) | 2022-11-09 | Paper |
| Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance | 2022-04-22 | Paper |
| MPSign: a signature from small-secret middle-product learning with errors | 2021-12-01 | Paper |
| Middle-product learning with rounding problem and its applications | 2020-05-20 | Paper |
| A refined analysis of the cost for solving LWE via uSVP | 2020-05-06 | Paper |
Improved combinatorial algorithms for the inhomogeneous short integer solution problem Journal of Cryptology | 2019-01-29 | Paper |
| Measuring, simulating and exploiting the head concavity phenomenon in BKZ | 2018-12-20 | Paper |
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Journal of Cryptology | 2018-05-28 | Paper |
| scientific article; zbMATH DE number 6820265 (Why is no real title available?) | 2017-12-19 | Paper |
ISRA-Based Grouping: A Disk Reorganization Approach for Disk Energy Conservation and Disk Performance Enhancement IEEE Transactions on Computers | 2017-07-27 | Paper |
Tuple lattice sieving LMS Journal of Computation and Mathematics | 2017-04-04 | Paper |
A Subfield Lattice Attack on Overstretched NTRU Assumptions Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Better polynomials for GNFS Mathematics of Computation | 2016-03-09 | Paper |
Root optimization of polynomials in the number field sieve Mathematics of Computation | 2015-07-20 | Paper |
Lattice decoding attacks on binary LWE Information Security and Privacy | 2014-07-24 | Paper |
An improved compression technique for signatures based on learning with errors Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Complicated dynamics of prototype continuous-line adaptive control system IEEE Transactions on Circuits and Systems | 1988-01-01 | Paper |
Disturbance-generated bifurcation in a prototype adaptive system with e/sub 1/-modification law IEEE Transactions on Automatic Control | 1988-01-01 | Paper |
Disturbance-generated bifurcations in a simple adaptive system: Simulation evidence Systems & Control Letters | 1986-01-01 | Paper |