Algebraic Relation of Three MinRank Algebraic Modelings. | 0 | 0.34 | 2022 |
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange | 0 | 0.34 | 2022 |
Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification | 0 | 0.34 | 2022 |
Several Improvements on BKZ Algorithm. | 0 | 0.34 | 2022 |
New complexity estimation on the Rainbow-Band-Separation attack | 0 | 0.34 | 2021 |
The Singularity Attack To The Multivariate Signature Scheme Himq-3 | 0 | 0.34 | 2021 |
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs. | 0 | 0.34 | 2021 |
Giophantus Distinguishing Attack Is A Low Dimensional Learning With Errors Problem | 0 | 0.34 | 2020 |
Letters for post-quantum cryptography standard evaluation | 0 | 0.34 | 2020 |
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber. | 0 | 0.34 | 2019 |
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol. | 0 | 0.34 | 2019 |
A Simple Key Reuse Attack on Ntru Cryptosystem. | 0 | 0.34 | 2019 |
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange. | 0 | 0.34 | 2019 |
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs). | 0 | 0.34 | 2019 |
Homomorphic Encryption Standard. | 0 | 0.34 | 2019 |
Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems | 3 | 0.45 | 2019 |
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme. | 0 | 0.34 | 2019 |
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption. | 0 | 0.34 | 2019 |
One Sample Ring-LWE with Rounding and Its Application to Key Exchange. | 0 | 0.34 | 2019 |
Complete Attack On Rlwe Key Exchange With Reused Keys, Without Signal Leakage | 1 | 0.36 | 2018 |
Improved Cryptanalysis of HFEv- via Projection. | 0 | 0.34 | 2018 |
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack. | 0 | 0.34 | 2018 |
How to validate the secret of a Ring Learning with Errors (RLWE) key. | 0 | 0.34 | 2018 |
Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption. | 0 | 0.34 | 2018 |
Why 1.02? The root Hermite factor of LLL and stochastic sandpile models. | 0 | 0.34 | 2018 |
The Beauty and the Beasts - The Hard Cases in LLL Reduction. | 0 | 0.34 | 2017 |
Post-Quantum Secure Remote Password Protocol from RLWE Problem. | 0 | 0.34 | 2017 |
HMFEv - An Efficient Multivariate Signature Scheme. | 0 | 0.34 | 2017 |
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World. | 5 | 0.40 | 2017 |
Current State of Multivariate Cryptography. | 9 | 0.48 | 2017 |
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree. | 0 | 0.34 | 2017 |
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction. | 0 | 0.34 | 2016 |
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld. | 0 | 0.34 | 2016 |
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme. | 1 | 0.41 | 2016 |
Simple Matrix – A Multivariate Public Key Cryptosystem (MPKC) for Encryption | 7 | 0.61 | 2015 |
A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups. | 0 | 0.34 | 2015 |
Zhfe, A New Multivariate Public Key Encryption Scheme | 21 | 0.74 | 2014 |
Provably Secure Group Key Management Approach Based upon Hyper-Sphere. | 0 | 0.34 | 2014 |
New candidates for multivariate trapdoor functions. | 5 | 0.48 | 2014 |
Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol | 0 | 0.34 | 2014 |
The Cubic Simple Matrix Encryption Scheme | 8 | 0.55 | 2014 |
Inverting square systems algebraically is exponential | 3 | 0.41 | 2014 |
A New Algorithm for Solving the Approximate Common Divisor Problem and Cryptanalysis of the FHE based on GACD. | 0 | 0.34 | 2014 |
Simple Matrix Scheme For Encryption | 28 | 1.11 | 2013 |
A Practical Attack On Patched Mifare Classic | 0 | 0.34 | 2013 |
Degree Of Regularity For Hfev And Hfev- | 15 | 0.72 | 2013 |
A variant of rainbow with shorter secret key and faster signature generation | 5 | 0.45 | 2013 |
Solving Degree and Degree of Regularity for Polynomial Systems over a Finite Fields. | 0 | 0.34 | 2013 |
Algebraic attack on lattice based cryptosystems via solving equations over real numbers. | 0 | 0.34 | 2012 |
New cryptographic constructions using generalized learning with errors problem. | 0 | 0.34 | 2012 |