Author of the publication

On the Security of the Algebraic Eraser Tag Authentication Protocol.

, and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 3-17. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting nonlinear pseudorandom number generators., , , and . Math. Comput., 74 (251): 1471-1494 (2005)Cryptanalysing the critical group: efficiently solving Biggs's discrete logarithm problem.. J. Math. Cryptol., 3 (3): 199-203 (2009)Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups., , and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 50-54. Springer, (1993)On the Security of the Algebraic Eraser Tag Authentication Protocol., and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 3-17. Springer, (2016)Reconstructing noisy polynomial evaluation in residue rings., , , and . J. Algorithms, 61 (2): 47-59 (2006)Triangulations of the sphere, bitrades and abelian groups., and . Combinatorica, 34 (5): 527-546 (2014)Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 446-453. Springer, (2004)PIR array codes with optimal PIR rates., and . ISIT, page 2658-2662. IEEE, (2017)A bound on the size of separating hash families, , , and . J. Comb. Theory Ser. A, 115 (7): 1246--1256 (2008)The discrete logarithm problem for exponents of bounded height., and . LMS J. Comput. Math., 17 (Theory): 148-156 (2014)