Author of the publication

Parallel Implementation of BDD Enumeration for LWE.

, , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 580-591. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public-Key Cryptography (Dagstuhl Seminar 16371)., , , and . Dagstuhl Reports, 6 (9): 46-58 (2016)Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring., and . J. Cryptology, 20 (1): 39-50 (2007)On the Security of the PKCS#1 v1.5 Signature Scheme., , and . ACM Conference on Computer and Communications Security, page 1195-1208. ACM, (2018)Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring., and . IACR Cryptology ePrint Archive, (2004)LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE., and . IACR Cryptology ePrint Archive, (2018)On CCA-Secure Fully Homomorphic Encryption., , , and . IACR Cryptology ePrint Archive, (2010)Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?, and . Public Key Cryptography, volume 4939 of Lecture Notes in Computer Science, page 37-46. Springer, (2008)Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA., and . Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, page 53-69. Springer, (2010)Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?, and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 487-504. Springer, (2009)Dimension Reduction Methods for Convolution Modular Lattices., and . CaLC, volume 2146 of Lecture Notes in Computer Science, page 110-125. Springer, (2001)