Author of the publication

Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups

, and . J. Cryptology, 16 (4): 239-247 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract).. EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, page 1-7. Springer, (2012)Adaptive precision LLL and Potential-LLL reductions with Interval arithmetic., and . IACR Cryptology ePrint Archive, (2016)Solving shortest and closest vector problems: The decomposition approach., , and . IACR Cryptology ePrint Archive, (2013)A Chosen IV Attack Against Turing., and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 194-207. Springer, (2003)Hash Functions and the (Amplified) Boomerang Attack., and . CRYPTO, volume 4622 of Lecture Notes in Computer Science, page 244-263. Springer, (2007)A Chosen-Ciphertext Attack against NTRU., and . CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 20-35. Springer, (2000)A New Public-Key Cryptosystem via Mersenne Numbers., , , and . CRYPTO (3), volume 10993 of Lecture Notes in Computer Science, page 459-482. Springer, (2018)Cryptanalysis of Another Knapsack Cryptosystem., and . ASIACRYPT, volume 739 of Lecture Notes in Computer Science, page 470-476. Springer, (1991)Discrete Logarithms in Small Characteristic Finite Fields: a Survey of Recent Advances (Invited Talk).. STACS, volume 66 of LIPIcs, page 3:1-3:1. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Cryptanalysis of the Tractable Rational Map Cryptosystem., , , and . Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 258-274. Springer, (2005)