Author of the publication

Towards Efficient LPN-Based Symmetric Encryption.

, , , and . ACNS (2), volume 12727 of Lecture Notes in Computer Science, page 208-230. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Sequentialize Independent Parallel Attacks?, and . IACR Cryptology ePrint Archive, (2016)Towards Efficient LPN-Based Symmetric Encryption., , , and . ACNS (2), volume 12727 of Lecture Notes in Computer Science, page 208-230. Springer, (2021)On Solving Lpn using BKW and Variants., , and . IACR Cryptol. ePrint Arch., (2015)Cryptanalysis of a Homomorphic Encryption Scheme., , and . IACR Cryptology ePrint Archive, (2016)Observations on the LPN Solving Algorithm from Eurocrypt'16., and . IACR Cryptology ePrint Archive, (2016)Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-., , and . ACNS, volume 7954 of Lecture Notes in Computer Science, page 552-569. Springer, (2013)Optimization of LPN Solving Algorithms., and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 703-728. (2016)LPN in Cryptography - an Algorithmic Study.. EPFL, Switzerland, (2017)How to Sequentialize Independent Parallel Attacks? - Biased Distributions Have a Phase Transition., and . ASIACRYPT (2), volume 9453 of Lecture Notes in Computer Science, page 704-731. Springer, (2015)