Author of the publication

Some cryptanalytic and coding-theoretic applications of a soft stern algorithm.

, , , and . Adv. Math. Commun., 13 (4): 559-578 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Do Not Bound to a Single Position: Near-Optimal Multi-positional Mismatch Attacks Against Kyber and Saber., and . PQCrypto, volume 14154 of Lecture Notes in Computer Science, page 291-320. Springer, (2023)Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber., and . IACR Cryptol. ePrint Arch., (2022)Improved Estimation of Key Enumeration with Applications to Solving LWE., and . ISIT, page 495-500. IEEE, (2023)On the Sample Complexity of solving LWE using BKW-Style Algorithms., , and . ISIT, page 2405-2410. IEEE, (2021)The Asymptotic Complexity of Coded-BKW with Sieving Using Increasing Reduction Factors.. ISIT, page 2579-2583. IEEE, (2019)Some cryptanalytic and coding-theoretic applications of a soft stern algorithm., , , and . Adv. Math. Commun., 13 (4): 559-578 (2019)Some Notes on Post-Quantum Cryptanalysis.. Lund University, Sweden, (2020)base-search.net (ftulundlup:oai:lup.lub.lu.se:ab79fe93-2f19-4e6d-b813-4fac4b3b8499).Modeling and Simulating the Sample Complexity of solving LWE using BKW-Style Algorithms., , and . IACR Cryptol. ePrint Arch., (2022)Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors., , , , and . IACR Cryptol. ePrint Arch., (2023)Making the BKW Algorithm Practical for LWE., , , , and . INDOCRYPT, volume 12578 of Lecture Notes in Computer Science, page 417-439. Springer, (2020)