Author of the publication

On the Security of the Algebraic Eraser Tag Authentication Protocol.

, and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 3-17. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Triangulations of the sphere, bitrades and abelian groups., and . Combinatorica, 34 (5): 527-546 (2014)A bound on the size of separating hash families, , , and . J. Comb. Theory Ser. A, 115 (7): 1246--1256 (2008)Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 446-453. Springer, (2004)Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups., , and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 50-54. Springer, (1993)PIR array codes with optimal PIR rates., and . ISIT, page 2658-2662. IEEE, (2017)Reconstructing noisy polynomial evaluation in residue rings., , , and . J. Algorithms, 61 (2): 47-59 (2006)On the Security of the Algebraic Eraser Tag Authentication Protocol., and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 3-17. Springer, (2016)Predicting nonlinear pseudorandom number generators., , , and . Math. Comput., 74 (251): 1471-1494 (2005)Cryptanalysing the critical group: efficiently solving Biggs's discrete logarithm problem.. J. Math. Cryptol., 3 (3): 199-203 (2009)A Generalization of Rational Interpolation Problem and the Solution of the Welch-Berlekamp Key Equation.. Des. Codes Cryptogr., 11 (3): 223-234 (1997)