Author of the publication

Cryptanalysis of MinRank.

, , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 280-296. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid approach for solving multivariate systems over finite fields, , and . Journal of Mathematical Cryptology, 3 (3): 177-197 (2010)Cryptanalysis of MinRank., , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 280-296. Springer, (2008)Efficient Computation of Zero-Dimensional Gröbner Bases by Change of Ordering., , , and . J. Symb. Comput., 16 (4): 329-344 (1993)A nearly optimal algorithm to decompose binary forms., , , and . J. Symb. Comput., (2021)Computing critical points for invariant algebraic systems., , , , and . J. Symb. Comput., (2023)A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV., , , and . IACR Cryptol. ePrint Arch., (2022)Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic., , and . Des. Codes Cryptogr., 69 (1): 1-52 (2013)FGb: A Library for Computing Gröbner Bases.. ICMS, volume 6327 of Lecture Notes in Computer Science, page 84-87. Springer, (2010)Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions., , , and . IACR Cryptology ePrint Archive, (2013)Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem., , , and . IACR Cryptology ePrint Archive, (2009)