Paul Stankovski Wagner

Orcid: 0000-0002-2002-4240

According to our database1, Paul Stankovski Wagner authored at least 28 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Consistency-or-Die: Consistency for Key Transparency.
IACR Cryptol. ePrint Arch., 2024

2023
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms.
Cryptogr. Commun., March, 2023

PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2023

2021
Improvements on Making BKW Practical for Solving LWE.
Cryptogr., 2021

On the Sample Complexity of solving LWE using BKW-Style Algorithms.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
Making the BKW Algorithm Practical for LWE.
IACR Cryptol. ePrint Arch., 2020

2019
A Key Recovery Reaction Attack on QC-MDPC.
IEEE Trans. Inf. Theory, 2019

On the Asymptotics of Solving the LWE Problem Using Coded-BKW With Sieving.
IEEE Trans. Inf. Theory, 2019

Error Amplification in Code-based Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Some cryptanalytic and coding-theoretic applications of a soft stern algorithm.
Adv. Math. Commun., 2019

2018
Guarding the Guards: Accountable Authorities in VANETs.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

2017
A Reaction Attack on the QC-LDPC McEliece Cryptosystem.
IACR Cryptol. ePrint Arch., 2017

Information set decoding with soft information and some cryptographic applications.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors.
Proceedings of the Information Systems Security and Privacy, 2017

Improved Greedy Nonrandomness Detectors for Stream Ciphers.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Coded-BKW with Sieving.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.
IACR Cryptol. ePrint Arch., 2016

Coded-BKW: Solving LWE Using Lattice Codes.
IACR Cryptol. ePrint Arch., 2016

2015
A generalized birthday approach for efficiently finding linear relations in ℓ-sequences.
Des. Codes Cryptogr., 2015

2014
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers.
J. Cryptol., 2014

eavesROP: Listening for ROP Payloads in Data Streams.
Proceedings of the Information Security - 17th International Conference, 2014

The efficiency of optimal sampling in the random S-box model.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
Cryptanalysis of Selected Stream Ciphers.
PhD thesis, 2013

2012
Improved distinguishers for HC-128.
Des. Codes Cryptogr., 2012

An optimal sampling technique for distinguishing random S-boxes.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Analysis of Xorrotation with Application to an HC-128 Variant.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2010
Greedy Distinguishers and Nonrandomness Detectors.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
An Efficient State Recovery Attack on X-FCSR-256.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009


  Loading...