Author of the publication

Analysis of Multivariate Encryption Schemes: Application to Dob.

, , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 155-183. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solving Compressed Right Hand Side Equation Systems with Linear Absorption., and . SETA, volume 7280 of Lecture Notes in Computer Science, page 291-302. Springer, (2012)Algebraic Analysis of the Simon Block Cipher Family.. LATINCRYPT, volume 9230 of Lecture Notes in Computer Science, page 157-169. Springer, (2015)An Analysis of the Hermes8 Stream Ciphers., , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 1-10. Springer, (2007)Analysis of Multivariate Encryption Schemes: Application to Dob., , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 155-183. Springer, (2021)Security notions for cloud storage and deduplication., , , , and . IACR Cryptology ePrint Archive, (2017)More Dual Rijndaels.. AES Conference, volume 3373 of Lecture Notes in Computer Science, page 142-147. Springer, (2004)Security Notions for Cloud Storage and Deduplication., , , , and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 347-365. Springer, (2018)Influence of addition modulo 2 n on algebraic attacks., , and . Cryptogr. Commun., 8 (2): 277-289 (2016)Analysis of Trivium Using Compressed Right Hand Side Equations., and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 18-32. Springer, (2011)MRHS Equation Systems.. Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 232-245. Springer, (2007)