2019
Solving discrete logarithm problems faster with the aid of pre-computation.
Discret. Appl. Math., 2019
2016
Comparison of perfect table cryptanalytic tradeoff algorithms.
Des. Codes Cryptogr., 2016
2015
Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks.
IEEE Trans. Inf. Forensics Secur., 2015
High-speed parallel implementations of the rainbow method based on perfect tables in a heterogeneous system.
Softw. Pract. Exp., 2015
2014
Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms.
J. Cryptol., 2014
Analysis of the Perfect Table Fuzzy Rainbow Tradeoff.
J. Appl. Math., 2014
2013
A Comparison of Cryptanalytic Tradeoff Algorithms.
J. Cryptol., 2013
Analysis of the Rainbow Tradeoff Algorithm Used in Practice.
IACR Cryptol. ePrint Arch., 2013
2012
Accelerating Pollard's Rho Algorithm on Finite Fields.
J. Cryptol., 2012
Young tableaux and crystal B(∞) for the exceptional Lie algebra types.
J. Comb. Theory A, 2012
Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff.
IACR Cryptol. ePrint Arch., 2012
High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System.
Proceedings of the Progress in Cryptology, 2012
2011
Analysis of Discrete Logarithm Algorithm using Pre-computation.
IACR Cryptol. ePrint Arch., 2011
Analysis of the Parallel Distinguished Point Tradeoff.
IACR Cryptol. ePrint Arch., 2011
2010
Secure and Efficient Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Computers, 2010
The cost of false alarms in Hellman and rainbow tradeoffs.
Des. Codes Cryptogr., 2010
2009
Success probability of the Hellman trade-off.
Inf. Process. Lett., 2009
Subset-Restricted Random Walks for Pollard rho Method on F<sub>p<sup>m</sup></sub>.
Proceedings of the Public Key Cryptography, 2009
2008
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version).
IACR Cryptol. ePrint Arch., 2008
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs.
Proceedings of the Information Security Practice and Experience, 2008
Speeding Up the Pollard Rho Method on Prime Fields.
Proceedings of the Advances in Cryptology, 2008
2005
Rediscovery of Time Memory Tradeoffs.
IACR Cryptol. ePrint Arch., 2005
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY.
IACR Cryptol. ePrint Arch., 2005
Period of Streamcipher <i>Edon80</i>.
Proceedings of the Progress in Cryptology, 2005
A New Class of Single Cycle T-Functions.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
New Applications of Time Memory Data Tradeoffs.
Proceedings of the Advances in Cryptology, 2005
2004
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
2003
Algebraic Attacks on Summation Generators.
IACR Cryptol. ePrint Arch., 2003
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Information Security and Cryptology, 2003
2002
Key recovery attacks on NTRU without ciphertext validation routine.
IACR Cryptol. ePrint Arch., 2002