21 – 30 of 44
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2021
-
Mark
On the Sample Complexity of solving LWE using BKW-Style Algorithms
(2021) 2021 IEEE International Symposium on Information Theory
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2020
-
Mark
Solving LPN Using Covering Codes
- Contribution to journal › Article
-
Mark
Making the BKW Algorithm Practical for LWE
(2020) International Conference on Cryptology in India - INDOCRYPT 2020 In Lecture Notes in Computer Science 12578. p.417-439
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A New Decryption Failure Attack Against HQC
(2020) 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020 In Lecture Notes in Computer Science 12491. p.353-382
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
(2020) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2020(4). p.209-238
- Contribution to journal › Article
-
Mark
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
(2020) 40th Annual International Cryptology Conference, CRYPTO 2020 In Lecture Notes in Computer Science 12171. p.359-386
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
- Contribution to journal › Article
-
Mark
A novel CCA attack using decryption errors against LAC
(2019) 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11921 LNCS. p.82-111
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some Cryptanalytic and Coding-Theoretic Applications of a Soft Stern Algorithm
- Contribution to journal › Article
-
Mark
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes
(2019) 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC), 2019 In Lecture Notes in Computer Science 11443. p.565-598
- Chapter in Book/Report/Conference proceeding › Book chapter
