| Publication | Date of Publication | Type |
|---|
Codes, cryptology and curves with computer algebra | 2017-10-04 | Paper |
On lower bounds for information set decoding over \(\mathbb F_q\) and on the effect of partial knowledge International Journal of Information and Coding Theory | 2017-07-26 | Paper |
Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures Designs, Codes and Cryptography | 2014-09-04 | Paper |
Foreword to the special issue: Computer algebra in coding theory and cryptography Applicable Algebra in Engineering, Communication and Computing | 2013-09-30 | Paper |
A multivariate based threshold ring signature scheme Applicable Algebra in Engineering, Communication and Computing | 2013-09-30 | Paper |
Fast verification for improved versions of the UOV and rainbow signature schemes Post-Quantum Cryptography | 2013-06-14 | Paper |
Linear recurring sequences for the UOV key generation revisited Lecture Notes in Computer Science | 2013-06-04 | Paper |
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC Information Security and Cryptology | 2013-05-28 | Paper |
Many weak keys for PRINTcipher: fast key recovery and countermeasures Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48 Cryptology and Network Security | 2012-07-20 | Paper |
Small public keys and fast verification for Multivariate Quadratic public key systems Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
Linear recurring sequences for the UOV key generation Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Obtaining and solving systems of equations in key variables only for the small variants of AES Mathematics in Computer Science | 2011-02-19 | Paper |
Decoding and finding the minimum distance with Gröbner bases: history and new insights | 2011-01-03 | Paper |
CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems Cryptology and Network Security | 2010-12-07 | Paper |
Towards provable security of the unbalanced oil and vinegar signature scheme under direct attacks Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
MXL\(_3\): an efficient algorithm for computing Gröbner bases of zero-dimensional ideals Information, Security and Cryptology – ICISC 2009 | 2010-07-16 | Paper |
Selecting parameters for the Rainbow signature scheme Post-Quantum Cryptography | 2010-06-17 | Paper |
Towards a better understanding of the semigroup tree Semigroup Forum | 2010-01-25 | Paper |
Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases Gröbner Bases, Coding, and Cryptography | 2009-12-16 | Paper |
Bounded distance decoding of linear error-correcting codes with Gröbner bases Journal of Symbolic Computation | 2009-10-16 | Paper |
Generalized Hermitian Codes Over$hboxGF,(2^r)$ IEEE Transactions on Information Theory | 2008-12-21 | Paper |
scientific article; zbMATH DE number 2169052 (Why is no real title available?) | 2005-05-20 | Paper |