1 – 37 of 37
- show: 50
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2023
-
Mark
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms
(
- Contribution to journal › Article
-
Mark
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
2023)(
- Working paper/Preprint › Preprint in preprint archive
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
-
Mark
Find the Bad Apples: An efficient method for perfectkey recovery under imperfect SCA oracles– A case study of Kyber
(
- Contribution to journal › Article
-
Mark
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2022
-
Mark
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
(
- Contribution to journal › Article
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
- 2021
-
Mark
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS
2021) 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021 In Lecture Notes in Computer Science 13093. p.33-62(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the Sample Complexity of solving LWE using BKW-Style Algorithms
2021) 2021 IEEE International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
(
- Contribution to journal › Article
-
Mark
Improvements on Making BKW Practical for Solving LWE
(
- Contribution to journal › Article
- 2020
-
Mark
Solving LPN Using Covering Codes
(
- Contribution to journal › Article
-
Mark
A New Decryption Failure Attack Against HQC
2020) 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020 In Lecture Notes in Computer Science 12491. p.353-382(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Making the BKW Algorithm Practical for LWE
2020) International Conference on Cryptology in India - INDOCRYPT 2020 In Lecture Notes in Computer Science 12578. p.417-439(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
2020) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2020(4). p.209-238(
- Contribution to journal › Article
-
Mark
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
2020) 40th Annual International Cryptology Conference, CRYPTO 2020 In Lecture Notes in Computer Science 12171. p.359-386(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
Some Cryptanalytic and Coding-Theoretic Applications of a Soft Stern Algorithm
(
- Contribution to journal › Article
-
Mark
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes
2019) 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC), 2019 In Lecture Notes in Computer Science 11443. p.565-598(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Improved Decoders for p-ary MDPC
2019) 11th International Workshop on Coding and Cryptography (WCC) 2019(
- Contribution to conference › Paper, not in proceeding
-
Mark
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
(
- Contribution to journal › Article
-
Mark
A Key Recovery Reaction Attack on QC-MDPC
(
- Contribution to journal › Article
-
Mark
A new birthday-type algorithm for attacking the fresh re-keying countermeasure
(
- Contribution to journal › Article
-
Mark
A novel CCA attack using decryption errors against LAC
2019) 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11921 LNCS. p.82-111(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
2019)(
- Working paper/Preprint › Preprint in preprint archive
- 2018
-
Mark
Ouroboros-E : An Efficient Lattice-based Key-Exchange Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
A reaction attack on the QC-LDPC mceliece cryptosystem
2017) 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10346 LNCS. p.51-68(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Coded-BKW with Sieving
2017) 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2017 In Lecture Notes in Computer Science 10624. p.323-346(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Information Set Decoding with Soft Information and some cryptographic applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
A p-ary MDPC scheme.
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A key recovery attack on MDPC with CCA security using decoding errors
2016) 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2016 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10031 LNCS. p.789-815(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems
2016)(
- Thesis › Doctoral thesis (compilation)
- 2015
-
Mark
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial
(
- Contribution to journal › Article
-
Mark
Coded-BKW: Solving LWE Using Lattice Codes.
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
Solving LPN Using Covering Codes
2014) 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt) 8873. p.1-20(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding