Author of the publication

Improved Algorithms for Isomorphisms of Polynomials.

, , and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 184-200. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault Analysis of Grain-128., , , , , , , and . HOST, page 7-14. IEEE Computer Society, (2009)A Survey of Differential Fault Analysis Against Classical RSA Implementations., , and . Fault Analysis in Cryptography, Springer, (2012)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator., and . FSE, volume 5086 of Lecture Notes in Computer Science, page 235-252. Springer, (2008)Improved Algorithms for Isomorphisms of Polynomials., , and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 184-200. Springer, (1998)Formal verification of a CRT-RSA implementation against fault attacks., , , and . J. Cryptographic Engineering, 3 (3): 157-167 (2013)Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults., , and . IACR Cryptology ePrint Archive, (2015)Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems., , and . IACR Cryptology ePrint Archive, (2010)Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems., , and . Cryptography and Security, volume 6805 of Lecture Notes in Computer Science, page 233-247. Springer, (2012)Two Power Analysis Attacks against One-Mask Methods., , and . FSE, volume 3017 of Lecture Notes in Computer Science, page 332-347. Springer, (2004)