Author of the publication

Efficient Implementations of Multivariate Quadratic Systems.

, , and . Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, page 174-187. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security services for protecting radio mobile systems., , and . Annales des Télécommunications, 55 (7-8): 352-360 (2000)Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?, and . IACR Cryptology ePrint Archive, (2016)Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations., and . IACR Cryptology ePrint Archive, (2009)An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol., , and . IACR Cryptology ePrint Archive, (2005)Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version)., , , , and . IACR Cryptology ePrint Archive, (2014)New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography., , and . IACR Cryptology ePrint Archive, (2013)An efficient forward private RFID protocol., , , and . ACM Conference on Computer and Communications Security, page 43-53. ACM, (2009)A Known Plaintext Attack of FEAL-4 and FEAL-6., and . CRYPTO, volume 576 of Lecture Notes in Computer Science, page 172-181. Springer, (1991)A Statistical Attack of the FEAL-8 Cryptosystem., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 22-33. Springer, (1990)QUAD: Overview and Recent Developments., , , , and . Symmetric Cryptography, volume 07021 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)