1 – 32 of 32
- show: 100
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
Non-Fungible Tokens as a Framework for Sustainable Innovation in Pharmaceutical R&D: A Smart Contract-Based Platform for Data Sharing and Rightsholder Protection
(
- Contribution to journal › Article
- 2023
-
Mark
PAPR : Publicly Auditable Privacy Revocation for Anonymous Credentials
2023) Cryptographers’ Track at the RSA Conference, CT-RSA 2023 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13871 LNCS. p.163-190(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms
(
- Contribution to journal › Article
- 2021
-
Mark
On the Sample Complexity of solving LWE using BKW-Style Algorithms
2021) 2021 IEEE International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improvements on Making BKW Practical for Solving LWE
(
- Contribution to journal › Article
- 2020
-
Mark
Making the BKW Algorithm Practical for LWE
2020) International Conference on Cryptology in India - INDOCRYPT 2020 In Lecture Notes in Computer Science 12578. p.417-439(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
A Key Recovery Reaction Attack on QC-MDPC
(
- Contribution to journal › Article
-
Mark
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
(
- Contribution to journal › Article
-
Mark
Guarding the Guards: Accountable Authorities in VANETs
2019) 2018 IEEE Vehicular Networking Conference (VNC)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some Cryptanalytic and Coding-Theoretic Applications of a Soft Stern Algorithm
(
- Contribution to journal › Article
- 2018
-
Mark
Error Amplification in Code-based Cryptography
2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258(
- Contribution to journal › Article
-
Mark
Not so greedy : Enhanced subset exploration for nonrandomness detectors
2018) International Conference on Information Systems Security and Privacy In Communications in Computer and Information Science 867. p.273-294(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Improved Greedy Nonrandomness Detectors for Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A reaction attack on the QC-LDPC mceliece cryptosystem
2017) 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10346 LNCS. p.51-68(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Information Set Decoding with Soft Information and some cryptographic applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Coded-BKW with Sieving
2017) 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2017 In Lecture Notes in Computer Science 10624. p.323-346(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
A key recovery attack on MDPC with CCA security using decoding errors
2016) 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2016 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10031 LNCS. p.789-815(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Autonomy in PhD-education – Supervising for Independence
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2015
-
Mark
A generalized birthday approach for efficiently finding linear relations in l-sequences
(
- Contribution to journal › Article
-
Mark
Coded-BKW: Solving LWE Using Lattice Codes.
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
(
- Contribution to journal › Article
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Efficiency of Optimal Sampling in the Random S-box Model
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
2014)(
- Book/Report › Report
- 2013
-
Mark
Cryptanalysis of Selected Stream Ciphers
(
- Thesis › Doctoral thesis (monograph)
- 2012
-
Mark
Improved distinguishers for HC-128
(
- Contribution to journal › Article
-
Mark
An Optimal Sampling Technique for Distinguishing Random S-boxes
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Analysis of Xorrotation With Application to an HC-128 Variant
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2010
-
Mark
Greedy distinguishers and nonrandomness detectors
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Automated algebraic cryptanalysis
2010) Tools for Cryptanalysis 2010 In Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis 2010 p.11-11(
- Contribution to journal › Published meeting abstract
-
Mark
Laboratory instructions as a cause of student dissonance
2010) LTHs 6:e Pedagogiska Inspirationskonferens, 2010(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2009
-
Mark
An efficient state recovery attack on X-FCSR-256
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding