Joshua Deaton

According to our database1, Joshua Deaton authored at least 9 papers between 2019 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
How Much can F5 Really Do.
IACR Cryptol. ePrint Arch., 2021

The Distinguishing Attack on HFE.
IACR Cryptol. ePrint Arch., 2021

The singularity attack to the multivariate signature scheme HIMQ-3.
Adv. Math. Commun., 2021

2020
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes.
IACR Cryptol. ePrint Arch., 2020

Giophantus distinguishing attack is a low dimensional learning with errors problem.
Adv. Math. Commun., 2020

A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
The Singularity Attack to the Multivariate Signature Scheme Himq-3.
IACR Cryptol. ePrint Arch., 2019

A Simple Key Reuse Attack on Ntru Cryptosystem.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme.
IACR Cryptol. ePrint Arch., 2019


  Loading...