Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-quantum cryptanalysis of the noisy version of Aaronson-Christiano's quantum money scheme., , , , and . IET Inf. Secur., 13 (4): 362-366 (2019)PKP-Based Signature Scheme., , , , and . IACR Cryptology ePrint Archive, (2018)A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words.. IACR Cryptology ePrint Archive, (2005)MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme., , , , , , and . INTRUST, volume 7222 of Lecture Notes in Computer Science, page 184-203. Springer, (2011)Security Analysis of Multivariate Polynomials for Hashing., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 115-124. Springer, (2008)Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems., and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 235-251. Springer, (2003)Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form., , and . ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 21-41. Springer, (2014)A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem.. EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, page 354-370. Springer, (2005)A differential approach to a polynomial equivalence problem., and . ISIT, page 142. IEEE, (2004)Polly Cracker, Revisited., , , , and . Electron. Colloquium Comput. Complex., (2012)