Search results for: Jean-Charles Faugere
Designs, Codes and Cryptography > 2018 > 86 > 10 > 2279-2314
Journal of Symbolic Computation > 2017 > 83 > C > 36-67
Journal of Symbolic Computation > 2017 > 80 > P3 > 538-569
Journal of Symbolic Computation > 2017 > 80 > P3 > 719-784
Lecture Notes in Computer Science > Information Security and Cryptology > Cipher Design and Analysis > 266-277
Journal of Symbolic Computation > 2016 > 76 > C > 107-141
Lecture Notes in Computer Science > Mathematical Software – ICMS 2010 > Computer Algebra (Invited) > 84-87
Lecture Notes in Computer Science > Information Security and Cryptology > Message Authentication Code and Hash Function > 115-124
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2003 > Public Key Cryptanalysis I > 44-60
Lecture Notes in Computer Science > Cryptology and Network Security > Public Key Cryptography > 169-183
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2010 > Cryptanalysis > 279-298
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2008 > Cryptanalysis II > 280-296
Lecture Notes in Computer Science > Information Security and Cryptology > Privacy and Algebraic Cryptanalysis > 387-403
Lecture Notes in Computer Science > Progress in Cryptology – LATINCRYPT 2010 > Post-Quantum Cryptography > 241-254
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Public Key Encryption II > 179-196