1 – 10 of 172
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2025
-
Mark
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem
2025)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Formal Analysis of Julia Key Agreement Protocol
2025) 26th International Conference on Information and Communications Security, ICICS 2024 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 15057 LNCS. p.171-190(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A BKW-Style Solver for the Restricted Syndrome Decoding Problem
2025)(
- Other contribution › Miscellaneous
- 2024
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2023
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
(
- Contribution to journal › Article
-
Mark
Correlation Attacks on Stream Ciphers
2023) p.143-154(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
-
Mark
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding