Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Joux,
add a person with the name Joux,
 

Other publications of authors with the same name

Advances in Cryptology -- CRYPTO 2004. (2004)Cryptanalysis of PKP: A New Approach., and . Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, page 165-172. Springer, (2001)A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)., , , and . IACR Cryptology ePrint Archive, (2009)A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic.. IACR Cryptology ePrint Archive, (2013)Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups., and . IACR Cryptology ePrint Archive, (2001)Introduction to Identity-Based Cryptography.. Identity-Based Cryptography, volume 2 of Cryptology and Information Security Series, IOS Press, (2009)Yet Another Attack on Vest., and . AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 221-235. Springer, (2008)Fast Correlation Attacks: An Algorithmic Point of View., , and . EUROCRYPT, volume 2332 of Lecture Notes in Computer Science, page 209-221. Springer, (2002)Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables., and . EUROCRYPT, volume 4515 of Lecture Notes in Computer Science, page 361-378. Springer, (2007)New Generic Algorithms for Hard Knapsacks., and . EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, page 235-256. Springer, (2010)