Daniel Smith-Tone
Orcid: 0000-0002-7995-8734
According to our database1,
Daniel Smith-Tone
authored at least 47 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials.
Proceedings of the Advances in Information and Computer Security, 2023
2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
Improving Support-Minors Rank Attacks: Applications to Gđisplaystyle eMSS and Rainbow.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Finite Fields Their Appl., 2021
2020
IACR Cryptol. ePrint Arch., 2020
Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis.
CoRR, 2020
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
2017
Int. J. Inf. Coding Theory, 2017
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme.
IACR Cryptol. ePrint Arch., 2017
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
2016
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.
J. Math. Cryptol., 2016
Des. Codes Cryptogr., 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016
2014
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme.
IACR Cryptol. ePrint Arch., 2014
2013
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems".
IACR Cryptol. ePrint Arch., 2013
2012
IACR Cryptol. ePrint Arch., 2012
2011
Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011
2009
IACR Cryptol. ePrint Arch., 2009