Author of the publication

Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings

(Eds.) volume 5479 of Lecture Notes in Computer Science, Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive precision LLL and Potential-LLL reductions with Interval arithmetic., and . IACR Cryptology ePrint Archive, (2016)Solving shortest and closest vector problems: The decomposition approach., , and . IACR Cryptology ePrint Archive, (2013)Discrete Logarithms in Small Characteristic Finite Fields: a Survey of Recent Advances (Invited Talk).. STACS, volume 66 of LIPIcs, page 3:1-3:1. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Cryptanalysis of the Tractable Rational Map Cryptosystem., , , and . Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 258-274. Springer, (2005)A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract).. EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, page 1-7. Springer, (2012)Differential Collisions in SHA-0., and . CRYPTO, volume 1462 of Lecture Notes in Computer Science, page 56-71. Springer, (1998)A Chosen IV Attack Against Turing., and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 194-207. Springer, (2003)Hash Functions and the (Amplified) Boomerang Attack., and . CRYPTO, volume 4622 of Lecture Notes in Computer Science, page 244-263. Springer, (2007)A Chosen-Ciphertext Attack against NTRU., and . CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 20-35. Springer, (2000)A New Public-Key Cryptosystem via Mersenne Numbers., , , and . CRYPTO (3), volume 10993 of Lecture Notes in Computer Science, page 459-482. Springer, (2018)