Author of the publication

The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives.

, , , , , , and . CRYPTO (4), volume 14923 of Lecture Notes in Computer Science, page 139-173. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solving Compressed Right Hand Side Equation Systems with Linear Absorption., and . SETA, volume 7280 of Lecture Notes in Computer Science, page 291-302. Springer, (2012)Algebraic Analysis of the Simon Block Cipher Family.. LATINCRYPT, volume 9230 of Lecture Notes in Computer Science, page 157-169. Springer, (2015)An Analysis of the Hermes8 Stream Ciphers., , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 1-10. Springer, (2007)Analysis of Multivariate Encryption Schemes: Application to Dob., , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 155-183. Springer, (2021)Security notions for cloud storage and deduplication., , , , and . IACR Cryptology ePrint Archive, (2017)More Dual Rijndaels.. AES Conference, volume 3373 of Lecture Notes in Computer Science, page 142-147. Springer, (2004)Security Notions for Cloud Storage and Deduplication., , , , and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 347-365. Springer, (2018)Influence of addition modulo 2 n on algebraic attacks., , and . Cryptogr. Commun., 8 (2): 277-289 (2016)Analysis of Trivium Using Compressed Right Hand Side Equations., and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 18-32. Springer, (2011)On the Number of Linearly Independent Equations Generated by XL., and . SETA, volume 5203 of Lecture Notes in Computer Science, page 239-251. Springer, (2008)