Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collecting relations for the Number Field Sieve in GF(p6)., , and . IACR Cryptology ePrint Archive, (2016)Relation collection for the Function Field Sieve., , and . IACR Cryptology ePrint Archive, (2013)On some properties of symmetric Boolean functions.. ISIT, page 500. IEEE, (2004)Discrete logarithm in GF(2809) with FFS., , , , , , , and . IACR Cryptology ePrint Archive, (2013)Matriochka symmetric Boolean functions., and . ISIT, page 1631-1635. IEEE, (2008)Critères de sécurité des algorithmes de chiffrement à clé secrète. (Security criteria of secret key ciphers).. Pierre and Marie Curie University, Paris, France, (2005)Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers., , , , , , , , , and 4 other author(s). IACR Cryptology ePrint Archive, (2009)Defeating MBA-based Obfuscation., , and . SPRO@CCS, page 27-38. ACM, (2016)Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3., , , and . Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, page 230-242. Springer, (2011)eSTREAM.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)