1 – 10 of 178
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2025
-
Mark
A BKW-Style Solver for the Restricted Syndrome Decoding Problem
2025)(
- Other contribution › Miscellaneous
-
Mark
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem
2025)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Formal Analysis of Julia Key Agreement Protocol
2025) 26th International Conference on Information and Communications Security, ICICS 2024 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 15057 LNCS. p.171-190(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2024
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
- 2023
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
-
Mark
Post-Quantum Cryptography : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings
(2023) The 14th International Conference on Post-Quantum Cryptography In Lecture Notes in Computer Science 14154.
- Book/Report › Conference proceeding (editor)
-
Mark
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
(
- Contribution to journal › Article