Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups., and . IACR Cryptology ePrint Archive, (2001)A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic.. IACR Cryptology ePrint Archive, (2013)A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)., , , and . IACR Cryptology ePrint Archive, (2009)Introduction to Identity-Based Cryptography.. Identity-Based Cryptography, volume 2 of Cryptology and Information Security Series, IOS Press, (2009)Yet Another Attack on Vest., and . AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 221-235. Springer, (2008)New Generic Algorithms for Hard Knapsacks., and . EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, page 235-256. Springer, (2010)Fast Correlation Attacks: An Algorithmic Point of View., , and . EUROCRYPT, volume 2332 of Lecture Notes in Computer Science, page 209-221. Springer, (2002)Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables., and . EUROCRYPT, volume 4515 of Lecture Notes in Computer Science, page 361-378. Springer, (2007)Loosening the KNOT., and . FSE, volume 2887 of Lecture Notes in Computer Science, page 87-99. Springer, (2003)Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC., , and . CRYPTO, volume 2442 of Lecture Notes in Computer Science, page 17-30. Springer, (2002)