Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems., and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 235-251. Springer, (2003)Security analysis of word problem-based cryptosystems., and . Des. Codes Cryptogr., 54 (1): 29-41 (2010)Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups., and . INDOCRYPT, volume 3348 of Lecture Notes in Computer Science, page 275-289. Springer, (2004)Interactivity in Constructive Cryptography : Modeling and Applications to Updatable Encryption and Private Information Retrieval., and . CoRR, (2022)On Self-Dual Affine-Invariant Codes., and . J. Comb. Theory, Ser. A, 67 (2): 223-244 (1994)Generic constructions of PoRs from codes and instantiations., and . J. Math. Cryptol., 13 (2): 81-106 (2019)Cryptanalysis of MinRank., , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 280-296. Springer, (2008)New proofs of retrievability using locally decodable codes., and . ISIT, page 1809-1813. IEEE, (2016)More on the covering radius of BCH codes., and . IEEE Trans. Inf. Theory, 42 (3): 1023-1028 (1996)A Framework for the Design of Secure and Efficient Proofs of Retrievability., and . IACR Cryptol. ePrint Arch., (2022)