| Publication | Date of Publication | Type |
|---|
Linear codes from planar functions and related covering codes Finite Fields and their Applications | 2024-12-27 | Paper |
On the SVP for low-dimensional circulant lattices Journal of Combinatorial Optimization | 2024-11-28 | Paper |
| Generalized implicit factorization problem | 2024-10-16 | Paper |
Polynomial-time key-recovery attacks against \texttt{NTRUReEncrypt} from ASIACCS'15 Journal of Systems Science and Complexity | 2024-08-29 | Paper |
Revisiting modular inversion hidden number problem and its applications IEEE Transactions on Information Theory | 2024-07-18 | Paper |
Public-key cryptosystems and signature schemes from \(p\)-adic lattices \(p\)-Adic Numbers, Ultrametric Analysis, and Applications | 2024-05-24 | Paper |
Partial prime factor exposure attacks on some RSA variants Theoretical Computer Science | 2024-05-06 | Paper |
Generalized attack on ECDSA: known bits in arbitrary positions Designs, Codes and Cryptography | 2023-11-07 | Paper |
Handle the traces: revisiting the attack on ECDSA with EHNP Information Security and Privacy | 2023-07-26 | Paper |
Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project Cryptology and Network Security | 2023-06-28 | Paper |
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs Lecture Notes in Computer Science | 2023-05-26 | Paper |
| A lattice reduction algorithm based on sublattice BKZ | 2023-04-13 | Paper |
| BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices | 2022-12-09 | Paper |
On some computational problems in local fields Journal of Systems Science and Complexity | 2022-08-19 | Paper |
Cloud-assisted LLL: a secure and efficient outsourcing algorithm for approximate shortest vector problem Information Security Practice and Experience | 2022-08-11 | Paper |
On the ideal shortest vector problem over random rational primes (available as arXiv preprint) | 2021-12-08 | Paper |
Computing Hermite Normal Form Faster via Solving System of Linear Equations Proceedings of the 2019 on International Symposium on Symbolic and Algebraic Computation | 2020-09-10 | Paper |
| New results on Modular Inversion Hidden Number problem and inversive congruential generator | 2020-05-20 | Paper |
Solving low-density multiple subset sum problems with SVP oracle Journal of Systems Science and Complexity | 2019-05-23 | Paper |
| A generalized attack on some variants of the RSA cryptosystem | 2019-02-20 | Paper |
| Cryptanalysis of the randomized version of a lattice-based signature scheme from PKC'08 | 2018-09-26 | Paper |
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem IEEE Transactions on Information Theory | 2017-07-27 | Paper |
The sum of binomial coefficients and integer factorization Integers | 2016-10-28 | Paper |
On random nonsingular Hermite normal form Journal of Number Theory | 2016-04-13 | Paper |
Cryptanalysis of the structure-preserving signature scheme on equivalence classes from Asiacrypt 2014 Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
A three-level sieve algorithm for the shortest vector problem Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
A new attack against the Selvi-Vivek-Rangan deterministic identity based signature scheme from ACISP 2012 Information Security and Privacy | 2014-07-24 | Paper |
Solving random subset sum problem by \(l_p\)-norm SVP oracle Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Covering radius of two-dimensional lattices Journal of Systems Science and Mathematical Sciences | 2013-11-19 | Paper |
An algebraic broadcast attack against NTRU Information Security and Privacy | 2012-09-07 | Paper |
A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack Cryptology and Network Security | 2012-07-20 | Paper |