Christiane Peters

According to our database1, Christiane Peters authored at least 26 papers between 2007 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032).
Dagstuhl Reports, 2016

2015
Structural Weaknesses in the Open Smart Grid Protocol.
IACR Cryptology ePrint Archive, 2015

Structural Weaknesses in the Open Smart Grid Protocol.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2013
ECM using Edwards curves.
Math. Comput., 2013

2011
Decoding Algorithms.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Faster 2-regular information-set decoding.
IACR Cryptology ePrint Archive, 2011

Really fast syndrome-based hashing.
IACR Cryptology ePrint Archive, 2011

Wild McEliece Incognito.
IACR Cryptology ePrint Archive, 2011

Wild McEliece Incognito.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

Smaller Decoding Exponents: Ball-Collision Decoding.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Faster 2-Regular Information-Set Decoding.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

Really Fast Syndrome-Based Hashing.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Smaller decoding exponents: ball-collision decoding.
IACR Cryptology ePrint Archive, 2010

Wild McEliece.
IACR Cryptology ePrint Archive, 2010

Wild McEliece.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Information-Set Decoding for Linear Codes over Fq.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010

2009
Information-set decoding for linear codes over Fq.
IACR Cryptology ePrint Archive, 2009

Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB.
IACR Cryptology ePrint Archive, 2009

FSBday.
Proceedings of the Progress in Cryptology, 2009

2008
Attacking and defending the McEliece cryptosystem.
IACR Cryptology ePrint Archive, 2008

ECM using Edwards curves.
IACR Cryptology ePrint Archive, 2008

Twisted Edwards Curves.
IACR Cryptology ePrint Archive, 2008

Attacking and Defending the McEliece Cryptosystem.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

Twisted Edwards Curves.
Proceedings of the Progress in Cryptology, 2008

2007
Optimizing double-base elliptic-curve single-scalar multiplication.
IACR Cryptology ePrint Archive, 2007

Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication.
Proceedings of the Progress in Cryptology, 2007


  Loading...