Author of the publication

Towards Efficient LPN-Based Symmetric Encryption.

, , , and . ACNS (2), volume 12727 of Lecture Notes in Computer Science, page 208-230. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger., , and . IWSEC, volume 14128 of Lecture Notes in Computer Science, page 173-192. Springer, (2023)Cryptanalysis of Reduced-Round MIBS Block Cipher., , and . CANS, volume 6467 of Lecture Notes in Computer Science, page 1-19. Springer, (2010)FFT-Hash-II is not yet Collision-free.. CRYPTO, volume 740 of Lecture Notes in Computer Science, page 587-593. Springer, (1992)Expected loss bounds for authentication in constrained channels., , and . INFOCOM, page 478-485. IEEE, (2012)HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems., and . AFRICACRYPT, volume 7918 of Lecture Notes in Computer Science, page 107-126. Springer, (2013)Synthetic linear analysis with applications to CubeHash and Rabbit., , and . Cryptogr. Commun., 4 (3-4): 259-276 (2012)Timed-Release Encryption With Master Time Bound Key (Extended)., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 10 (4): 88-108 (2019)Perfect Diffusion Primitives for Block Ciphers., and . Selected Areas in Cryptography, volume 3357 of Lecture Notes in Computer Science, page 84-99. Springer, (2004)FOX : A New Family of Block Ciphers., and . Selected Areas in Cryptography, volume 3357 of Lecture Notes in Computer Science, page 114-129. Springer, (2004)Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing., and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 74-85. Springer, (2004)