2022
A Note on the Ramanujan Machine.
CoRR, 2022
2021
Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More.
IACR Cryptol. ePrint Arch., 2021
Discovering New L-Function Relations Using Algebraic Sieving.
IACR Cryptol. ePrint Arch., 2021
Near-Optimal Pool Testing under Urgency Constraints.
CoRR, 2021
2020
New number-theoretic cryptographic primitives.
J. Math. Cryptol., 2020
A Fractional 3n+1 Conjecture.
CoRR, 2020
The Look-and-Say The Biggest Sequence Eventually Cycles.
CoRR, 2020
Stuttering Conway Sequences Are Still Conway Sequences.
CoRR, 2020
Optimal Covid-19 Pool Testing with a priori Information.
CoRR, 2020
2019
The Thirteenth Power Residue Symbol.
IACR Cryptol. ePrint Arch., 2019
2017
Exploring Naccache-Stern Knapsack Encryption.
IACR Cryptol. ePrint Arch., 2017
2015
A Number-Theoretic Error-Correcting Code.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015
2014
How to Sign Paper Contracts? Conjectures and Evidence Related to Equitable and Efficient Collaborative Task Scheduling.
Proceedings of the Open Problems in Mathematics and Computational Science, 2014
2013
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling.
IACR Cryptol. ePrint Arch., 2013
2012
Defensive Leakage Camouflage.
IACR Cryptol. ePrint Arch., 2012
2011
Modulus fault attacks against RSA-CRT signatures.
J. Cryptogr. Eng., 2011
2010
A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
New Families of ECM Curves for Cunningham Numbers.
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010
2009
Factoring Unbalanced Moduli with Known Bits.
IACR Cryptol. ePrint Arch., 2009
Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
IACR Cryptol. ePrint Arch., 2009
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.
IACR Cryptol. ePrint Arch., 2009
Cryptanalysis of CubeHash.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
2006
Why One Should Also Secure RSA Public Key Elements.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2004
Correlation Power Analysis with a Leakage Model.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
2003
Chemical Combinatorial Attacks on Keyboards.
IACR Cryptol. ePrint Arch., 2003
Optimal Statistical Power Analysis.
IACR Cryptol. ePrint Arch., 2003
Classification of Boolean cubic forms of nine variables.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Fast Point Multiplication on Elliptic Curves through Isogenies.
Proceedings of the Applied Algebra, 2003
2002
Weierstraß Elliptic Curves and Side-Channel Attacks.
Proceedings of the Public Key Cryptography, 2002
2001
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding.
Proceedings of the Advances in Cryptology, 2001
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001