Joana Treger

According to our database1, Joana Treger authored at least 8 papers between 2009 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes.
IACR Cryptol. ePrint Arch., 2015

2012
A family of weak keys in HFE and the corresponding practical key-recovery.
J. Math. Cryptol., 2012

A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption.
IACR Cryptol. ePrint Arch., 2012

Increasing Block Sizes Using Feistel Networks: The Example of the AES.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2010
Generic Attacks on Misty Schemes.
Proceedings of the Progress in Cryptology, 2010

Cryptanalysis of the Hidden Matrix Cryptosystem.
Proceedings of the Progress in Cryptology, 2010

2009
Generic Attacks on Misty Schemes -5 rounds is not enough-.
IACR Cryptol. ePrint Arch., 2009

Generic Attacks on Feistel Networks with Internal Permutations.
Proceedings of the Progress in Cryptology, 2009


  Loading...