On Some Computational Problems in Local Fields | 0 | 0.34 | 2022 |
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project | 0 | 0.34 | 2022 |
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange. | 0 | 0.34 | 2022 |
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited | 0 | 0.34 | 2021 |
It all Started with Compression: Another Look at Reconciliation Mechanism | 0 | 0.34 | 2020 |
Lattice Klepto Revisited | 0 | 0.34 | 2020 |
Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NISTPQC Project | 0 | 0.34 | 2020 |
Key Encapsulation Mechanism From Modular Multivariate Linear Equations. | 0 | 0.34 | 2019 |
Computing Hermite Normal Form Faster via Solving System of Linear Equations | 0 | 0.34 | 2019 |
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator | 0 | 0.34 | 2019 |
Breaking Hk17 In Practice | 0 | 0.34 | 2019 |
Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project. | 0 | 0.34 | 2018 |
Cryptanalysis of Compact-LWE Submitted to NIST PQC Project. | 0 | 0.34 | 2018 |
A Generalized Attack on Some Variants of the RSA Cryptosystem. | 0 | 0.34 | 2018 |
Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08. | 0 | 0.34 | 2018 |
The Search Successive Minima Problem Is Equivalent to Its Optimization Version. | 0 | 0.34 | 2017 |
Cryptanalysis of HK17. | 0 | 0.34 | 2017 |
Solving low-density multiple subset sum problems with SVP oracle. | 2 | 0.39 | 2016 |
Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014. | 1 | 0.34 | 2016 |
Two Types of Special Bases for Integral Lattices. | 0 | 0.34 | 2015 |
Relations Between Minkowski-Reduced Basis and \theta -orthogonal Basis of Lattice. | 0 | 0.34 | 2015 |
Solving Random Subset Sum Problem by lp-norm SVP Oracle. | 0 | 0.34 | 2014 |
A Three-Level Sieve Algorithm for the Shortest Vector Problem. | 18 | 0.70 | 2013 |
Improvements on Reductions among Different Variants of SVP and CVP | 1 | 0.36 | 2013 |
An efficient broadcast attack against NTRU | 1 | 0.36 | 2012 |
A New Reduction from Search SVP to Optimization SVP | 0 | 0.34 | 2012 |
An algebraic broadcast attack against NTRU | 3 | 0.44 | 2012 |
An algorithm for factoring integers. | 0 | 0.34 | 2012 |
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem | 4 | 0.43 | 2011 |
Cryptanalysis of the AAbeta Cryptosystem based on Linear Diophantine Equation Discrete Log Problem. | 0 | 0.34 | 2011 |
A Note on the Density of the Multiple Subset Sum Problems. | 0 | 0.34 | 2011 |
A new lattice-based public-key cryptosystem mixed with a knapsack | 2 | 0.40 | 2011 |
A general NTRU-Like framework for constructing lattice-based public-key cryptosystems | 1 | 0.36 | 2011 |
A Broadcast Attack against NTRU Using Ding's Algorithm. | 2 | 0.39 | 2010 |
A New Lattice for Implicit Factoring. | 0 | 0.34 | 2009 |
A New Lattice-Based Cryptosystem Mixed with a Knapsack. | 0 | 0.34 | 2009 |
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem. | 0 | 0.34 | 2008 |