Author of the publication

Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.

, , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 393-414. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)., , and . ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 63-84. Springer, (2014)We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve., , , and . ASIACRYPT (4), volume 14441 of Lecture Notes in Computer Science, page 138-166. Springer, (2023)A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over F2., , and . SOSA, page 285-296. SIAM, (2022)Fast Lattice-Based Encryption: Stretching Spring., , , and . PQCrypto, volume 10346 of Lecture Notes in Computer Science, page 125-142. Springer, (2017)Fast Exhaustive Search for Polynomial Systems in F2., , , , , and . IACR Cryptology ePrint Archive, (2010)Sparse Gaussian Elimination Modulo p: An Update., and . CASC, volume 9890 of Lecture Notes in Computer Science, page 101-116. Springer, (2016)Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512., , , and . Selected Areas in Cryptography, volume 6544 of Lecture Notes in Computer Science, page 18-35. Springer, (2010)Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem., , , and . Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, page 473-493. Springer, (2011)Les attaques cryptographiques sont-elles toujours meilleures que la force brute ?. (2022)Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques., and . Selected Areas in Cryptography, volume 5381 of Lecture Notes in Computer Science, page 245-261. Springer, (2008)