1 – 100 of 172
- show: 100
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2023
-
Mark
Post-Quantum Cryptography : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings
(2023) The 14th International Conference on Post-Quantum Cryptography In Lecture Notes in Computer Science 14154.
- Book/Report › Conference proceeding (editor)
-
Mark
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
2023)(
- Working paper/Preprint › Preprint in preprint archive
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
(
- Contribution to journal › Article
-
Mark
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
-
Mark
Preface
2023) Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, Proceedings In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14154 LNCS.(
- Chapter in Book/Report/Conference proceeding › Preface to conference proceeding
-
Mark
Correlation Attacks on Stream Ciphers
2023) p.143-154(
- Chapter in Book/Report/Conference proceeding › Book chapter
- 2022
-
Mark
Post-Quantum Cryptography : 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings
- Book/Report › Conference proceeding (editor)
-
Mark
Preface
2022) 13th International Conference on Post-Quantum Cryptography, PQCrypto 2022 In Lecture Notes in Computer Science 13512 LNCS.(
- Contribution to journal › Debate/Note/Editorial
-
Mark
Attacks on the Firekite Cipher
(
- Contribution to journal › Article
-
Mark
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
(
- Contribution to journal › Article
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
- 2021
-
Mark
Improvements on Making BKW Practical for Solving LWE
(
- Contribution to journal › Article
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
(
- Contribution to journal › Article
-
Mark
Improved guess-and-determine and distinguishing attacks on snow-v
(
- Contribution to journal › Article
-
Mark
SNOW-Vi : An extreme performance variant of SNOW-V for lower grade CPUs
2021) 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021 p.261-272(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS
2021) 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021 In Lecture Notes in Computer Science 13093. p.33-62(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEAD, Round 3 Tweak and Motivation
2021)(
- Book/Report › Report
-
Mark
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems
2021) 2021 IEEE International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2020
-
Mark
Solving LPN Using Covering Codes
(
- Contribution to journal › Article
-
Mark
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
2020) 40th Annual International Cryptology Conference, CRYPTO 2020 In Lecture Notes in Computer Science 12171. p.359-386(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Spectral analysis of ZUC-256
(
- Contribution to journal › Article
-
Mark
An overview of cryptographic primitives for possible use in 5G and beyond
(
- Contribution to journal › Scientific review
-
Mark
Making the BKW Algorithm Practical for LWE
2020) International Conference on Cryptology in India - INDOCRYPT 2020 In Lecture Notes in Computer Science 12578. p.417-439(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A New Decryption Failure Attack Against HQC
2020) 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020 In Lecture Notes in Computer Science 12491. p.353-382(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
Improved Decoders for p-ary MDPC
2019) 11th International Workshop on Coding and Cryptography (WCC) 2019(
- Contribution to conference › Paper, not in proceeding
-
Mark
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
(
- Contribution to journal › Article
-
Mark
Some Cryptanalytic and Coding-Theoretic Applications of a Soft Stern Algorithm
(
- Contribution to journal › Article
-
Mark
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes
2019) 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC), 2019 In Lecture Notes in Computer Science 11443. p.565-598(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
A new birthday-type algorithm for attacking the fresh re-keying countermeasure
(
- Contribution to journal › Article
-
Mark
A Key Recovery Reaction Attack on QC-MDPC
(
- Contribution to journal › Article
-
Mark
Improved iterative decoding of QC-MDPC codes in the McEliece public key cryptosystem
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Vectorized linear approximations for attacks on SNOW 3G
2019) 27th Annual Fast Software Encryption Conference, FSE 2020 In IACR Transactions on Symmetric Cryptology 2019(4). p.249-271(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A new SNOW stream cipher called SNOW-V
(
- Contribution to journal › Article
-
Mark
An AEAD Variant of the Grain Stream Cipher
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A novel CCA attack using decryption errors against LAC
2019) 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11921 LNCS. p.82-111(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
2019)(
- Working paper/Preprint › Preprint in preprint archive
- 2018
-
Mark
Ouroboros-E : An Efficient Lattice-based Key-Exchange Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Error Amplification in Code-based Cryptography
2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258(
- Contribution to journal › Article
- 2017
-
Mark
Editorial : Special issue on coding and cryptography
(
- Contribution to journal › Debate/Note/Editorial
-
Mark
Information Set Decoding with Soft Information and some cryptographic applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Coded-BKW with Sieving
2017) 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2017 In Lecture Notes in Computer Science 10624. p.323-346(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A reaction attack on the QC-LDPC mceliece cryptosystem
2017) 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10346 LNCS. p.51-68(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
A p-ary MDPC scheme.
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A key recovery attack on MDPC with CCA security using decoding errors
2016) 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2016 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10031 LNCS. p.789-815(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
(
- Contribution to journal › Article
-
Mark
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes
(
- Contribution to journal › Article
- 2015
-
Mark
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial
(
- Contribution to journal › Article
-
Mark
A generalized birthday approach for efficiently finding linear relations in l-sequences
(
- Contribution to journal › Article
-
Mark
Coded-BKW: Solving LWE Using Lattice Codes.
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
(
- Contribution to journal › Article
-
Mark
Solving LPN Using Covering Codes
2014) 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt) 8873. p.1-20(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications
(
- Contribution to journal › Article
- 2013
-
Mark
Advances in Cryptology -- EUROCRYPT 2013
Johansson, Thomas LU and Phong Q., Nguyen (2013)
- Book/Report › Anthology (editor)
-
Mark
Improved Key Recovery Attack on the BEAN Stream Cipher
2013) In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96A(6). p.1437-1444(
- Contribution to journal › Article
-
Mark
A new algorithm for finding low-weight polynomial multiples and its application to TCHo
2013) International Workshop on Coding and Cryptography, WCC 2013(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2012
-
Mark
Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques
- Book/Report › Anthology (editor)
-
Mark
A Survey on Fast Correlation Attacks
(
- Contribution to journal › Scientific review
-
Mark
Improved distinguishers for HC-128
(
- Contribution to journal › Article
-
Mark
Analysis of Xorrotation With Application to an HC-128 Variant
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A new version of McEliece PKC based on convolutional codes
2012) International Conference on Information and Communications Security In Lecture Notes in Computer Science 7618. p.461-470(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
2012) The Third International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2012)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some results on fast algebraic attacks and higher-order non-linearities
(
- Contribution to journal › Article
-
Mark
On Hardware-Oriented Message Authentication
(
- Contribution to journal › Article
-
Mark
Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials
(
- Contribution to journal › Article
- 2011
-
Mark
Grain-128a: a new version of Grain-128 with optional authentication
(
- Contribution to journal › Article
-
Mark
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
(
- Contribution to journal › Article
-
Mark
Linear Attacks on Stream Ciphers
2011) p.55-85(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
On Hardware-Oriented Message Authentication with Applications Towards RFID
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On equivalence classes of Boolean functions
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
An improvement to Stern's algorithm
2011)(
- Book/Report › Report
-
Mark
Evaluation of Some Algorithms for Hardware-Oriented Message Authentication
2011)(
- Book/Report › Report
-
Mark
A note on fast algebraic attacks and higher order nonlinearities
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
A New Version of Grain-128 with Authentication
2011) Symmetric Key Encryption Workshop 2011(
- Contribution to conference › Paper, not in proceeding
- 2010
-
Mark
Security Evaluation of Stream Cipher Enocoro-128v2
2010)(
- Book/Report › Report
- 2009
-
Mark
An overview of distinguishing attacks on stream ciphers
(
- Contribution to journal › Article
-
Mark
Improving the rainbow attack by reusing colours
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An efficient state recovery attack on X-FCSR-256
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2008
-
Mark
Breaking the F-FCSR-H stream cipher in real time
2008) ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security 5350. p.557-569(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Grain family of stream ciphers
2008) p.179-190(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
One-sweep APP decoding algorithm for binary block codes with reduced trellis memory
2008) p.88-93(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2007
-
Mark
Two General Attacks on Pomaranch-like Keystream Generators
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A framework for chosen IV statistical analysis of stream ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the problem of finding linear approximations and cryptanalysis of Pomaranch Version 2
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptanalysis of Achterbahn-Version 2
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A key recovery attack on Edon80
2007) ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security 4833. p.568-581(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A note on distinguishing attacks
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptanalysis of Achterbahn-128/80
(
- Contribution to journal › Article
-
Mark
Grain - A stream cipher for constrained environments
(
- Contribution to journal › Article
-
Mark
A linear distinguishing attack on SCREAM
(
- Contribution to journal › Article
- 2006
-
Mark
Cryptanalysis of Achterbahn
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers
(
- Contribution to journal › Article
-
Mark
Two new attacks on the self-shrinking generator
(
- Contribution to journal › Article
-
Mark
A stream cipher proposal: Grain-128
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding