Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Partial Key Exposure: Generalized Framework to Attack RSA.. INDOCRYPT, volume 7107 of Lecture Notes in Computer Science, page 76-92. Springer, (2011)Observing biases in the state: case studies with Trivium and Trivia-SC., , and . Des. Codes Cryptogr., 82 (1-2): 351-375 (2017)A New Distinguisher on Grain v1 for 106 Rounds.. ICISS, volume 9478 of Lecture Notes in Computer Science, page 334-344. Springer, (2015)Cryptanalysis of elliptic curve hidden number problem from PKC 2017., , and . Des. Codes Cryptogr., 88 (2): 341-361 (2020)Some applications of lattice based root finding techniques., and . Adv. in Math. of Comm., 4 (4): 519-531 (2010)Cryptanalysis of RSA with more than one decryption exponent., and . Inf. Process. Lett., 110 (8-9): 336-340 (2010)An 8-bit 500 MSPS segmented current steering DAC using Chinese abacus technique., and . VDAT, page 1-2. IEEE, (2016)Cryptanalysis of Multi-Prime Φ-Hiding Assumption., , , , , and . IACR Cryptology ePrint Archive, (2016)Cryptanalysis of Dual CRT-RSA., and . IACR Cryptology ePrint Archive, (2010)Revisiting Prime Power RSA.. IACR Cryptology ePrint Archive, (2015)