1 – 10 of 16
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2021
-
Mark
Improvements on Making BKW Practical for Solving LWE
(
- Contribution to journal › Article
- 2020
-
Mark
Making the BKW Algorithm Practical for LWE
2020) International Conference on Cryptology in India - INDOCRYPT 2020 In Lecture Notes in Computer Science 12578. p.417-439(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
Some Cryptanalytic and Coding-Theoretic Applications of a Soft Stern Algorithm
(
- Contribution to journal › Article
-
Mark
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
(
- Contribution to journal › Article
-
Mark
A Key Recovery Reaction Attack on QC-MDPC
(
- Contribution to journal › Article
- 2018
-
Mark
Error Amplification in Code-based Cryptography
2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258(
- Contribution to journal › Article
- 2017
-
Mark
A reaction attack on the QC-LDPC mceliece cryptosystem
2017) 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10346 LNCS. p.51-68(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Coded-BKW with Sieving
2017) 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2017 In Lecture Notes in Computer Science 10624. p.323-346(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Information Set Decoding with Soft Information and some cryptographic applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
A key recovery attack on MDPC with CCA security using decoding errors
2016) 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2016 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10031 LNCS. p.789-815(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding