Author of the publication

Cryptanalysis of Tweaked Versions of SMASH and Reparation.

, , and . Selected Areas in Cryptography, volume 5381 of Lecture Notes in Computer Science, page 136-150. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regularity properties of definable sets of reals.. Ann. Pure Appl. Log., 29 (3): 289-324 (1985)The Herbrand Symposium: (Marseilles July 16-July 24 1981).. J. Symb. Log., 48 (4): 1210-1232 (1983)A New Look at the Interpolation Problem.. J. Symb. Log., 40 (1): 1-13 (1975)Lattice Reduction: A Toolbox for the Cryptanalyst., and . J. Cryptol., 11 (3): 161-185 (1998)Twin signatures: an alternative to the hash-and-sign paradigm., , and . ACM Conference on Computer and Communications Security, page 20-27. ACM, (2001)The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications., and . CRYPTO, volume 1666 of Lecture Notes in Computer Science, page 31-46. Springer, (1999)A New Identification Scheme Based on Syndrome Decoding.. CRYPTO, volume 773 of Lecture Notes in Computer Science, page 13-21. Springer, (1993)Designing Identification Schemes with Keys of Short Size.. CRYPTO, volume 839 of Lecture Notes in Computer Science, page 164-173. Springer, (1994)Flaws in Applying Proof Methodologies to Signature Schemes., , , and . CRYPTO, volume 2442 of Lecture Notes in Computer Science, page 93-110. Springer, (2002)Probing Attacks on Tamper-Resistant Devices., , and . CHES, volume 1717 of Lecture Notes in Computer Science, page 303-315. Springer, (1999)