Author of the publication

Benes and Butterfly Schemes Revisited.

, and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 92-116. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Face: New Public Key Multivariate Schemes., and . AFRICACRYPT, volume 10831 of Lecture Notes in Computer Science, page 252-265. Springer, (2018)Improved Algorithms for the Permuted Kernel Problem., and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 391-402. Springer, (1993)Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms.. EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 33-48. Springer, (1996)UOV-Pepper: New Public Key Short Signature in Degree 3., and . IACR Cryptol. ePrint Arch., (2021)Two-Face: New Public Key Multivariate Schemes., and . IACR Cryptology ePrint Archive, (2017)Two Simple Composition Theorems with H-coefficients.. AFRICACRYPT, volume 10831 of Lecture Notes in Computer Science, page 72-86. Springer, (2018)Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security.. CRYPTO, volume 2729 of Lecture Notes in Computer Science, page 513-529. Springer, (2003)Asymmetric Cryptography with a Hidden Monomial.. CRYPTO, volume 1109 of Lecture Notes in Computer Science, page 45-60. Springer, (1996)Collisions and Inversions for Damgård's Whole Hash Function.. ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 307-321. Springer, (1994)Generic Attacks on Misty Schemes., , and . LATINCRYPT, volume 6212 of Lecture Notes in Computer Science, page 222-240. Springer, (2010)