Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PKP-Based Signature Scheme., , , , and . IACR Cryptology ePrint Archive, (2018)A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words.. IACR Cryptology ePrint Archive, (2005)MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme., , , , , , and . INTRUST, volume 7222 of Lecture Notes in Computer Science, page 184-203. Springer, (2011)Security Analysis of Multivariate Polynomials for Hashing., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 115-124. Springer, (2008)Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form., , and . ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 21-41. Springer, (2014)Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems., and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 235-251. Springer, (2003)A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem.. EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, page 354-370. Springer, (2005)Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem., , , and . Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, page 473-493. Springer, (2011)A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems., , , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 150-174. Springer, (2015)Non-quantum cryptanalysis of the noisy version of Aaronson-Christiano's quantum money scheme., , , , and . IET Inf. Secur., 13 (4): 362-366 (2019)