Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings.. SCN, volume 7485 of Lecture Notes in Computer Science, page 361-373. Springer, (2012)Decoding Random Linear Codes in $\mathcalO(2^0.054n)$., , and . ASIACRYPT, volume 7073 of Lecture Notes in Computer Science, page 107-124. Springer, (2011)Permutationspolynome in der Kryptographie. TU Dresden, Diplomarbeit, (2009)Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important., and . AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 188-202. Springer, (2012)A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems., , , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 150-174. Springer, (2015)Efficient Implementations of MQPKS on Constrained Devices., , and . CHES, volume 7428 of Lecture Notes in Computer Science, page 374-389. Springer, (2012)Unravel XL and its variants., and . IACR Cryptology ePrint Archive, (2010)Roots of Square: Cryptanalysis of Double-Layer Square and Square+., and . PQCrypto, volume 7071 of Lecture Notes in Computer Science, page 83-97. Springer, (2011)Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields., and . IACR Cryptology ePrint Archive, (2011)Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited., and . Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 156-171. Springer, (2012)