Author of the publication

Cryptanalysis of Rational Multivariate Public Key Cryptosystems.

, and . PQCrypto, volume 5299 of Lecture Notes in Computer Science, page 124-136. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kipnis-Shamir's Attack on HFE Revisited., , and . IACR Cryptology ePrint Archive, (2007)Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2., , , and . AFRICACRYPT, volume 6055 of Lecture Notes in Computer Science, page 69-81. Springer, (2010)Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS., , , , and . Int. J. Netw. Secur., 20 (5): 923-930 (2018)Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol., , , , and . IACR Cryptol. ePrint Arch., (2017)Growth of the Ideal Generated by a Quadratic Boolean Function., , and . PQCrypto, volume 6061 of Lecture Notes in Computer Science, page 13-27. Springer, (2010)A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)., , and . IACR Cryptology ePrint Archive, (2019)Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems., , , , and . WCC, volume 3969 of Lecture Notes in Computer Science, page 242-251. Springer, (2005)Cryptanalysis of HFEv and Internal Perturbation of HFE., and . Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 288-301. Springer, (2005)Leakage of signal function with reused keys in RLWE key exchange., , , , and . ICC, page 1-6. IEEE, (2017)An Improved Practical Key Mismatch Attack Against NTRU., , , , and . PQCrypto (1), volume 14771 of Lecture Notes in Computer Science, page 322-342. Springer, (2024)