Daniel Smith-Tone

Orcid: 0000-0002-7995-8734

According to our database1, Daniel Smith-Tone authored at least 51 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Cryptanalysis of the best HFE-LL' Constructions.
IACR Cryptol. ePrint Arch., 2025

Practical Attack on All Parameters of the HPPC Signature Scheme.
IACR Cryptol. ePrint Arch., 2025

A correct justification for the CHMT algorithm for solving underdetermined multivariate systems.
Finite Fields Their Appl., 2025

2024
On the Semidirect Discrete Logarithm Problem in Finite Groups.
IACR Cryptol. ePrint Arch., 2024

Improved Cryptanalysis of HFERP.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Practical Attack on All Parameters of the DME Signature Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

On the Semidirect Discrete Logarithm Problem in Finite Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
A Total Break of the 3WISE Digital Signature Scheme.
IACR Cryptol. ePrint Arch., 2023

A Total Break of the Scrap Digital Signature Scheme.
IACR Cryptol. ePrint Arch., 2023

The Generating Series of Support Minors MinRank Ideals.
IACR Cryptol. ePrint Arch., 2023

Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials.
Proceedings of the Advances in Information and Computer Security, 2023

2022
2F - A New Method for Constructing Efficient Multivariate Encryption Schemes.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

IPRainbow.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

Improving Support-Minors Rank Attacks: Applications to Gđisplaystyle eMSS and Rainbow.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Improving Support-Minors rank attacks: applications to GeMSS and Rainbow.
IACR Cryptol. ePrint Arch., 2021

A multivariate cryptosystem inspired by random linear codes.
Finite Fields Their Appl., 2021

New Practical Multivariate Signatures from a Nonlinear Modifier.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

On the Effect of Projection on Rank Attacks in Multivariate Cryptography.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

2020
Rainbow Band Separation is Better than we Thought.
IACR Cryptol. ePrint Arch., 2020

All in the C<sup>*</sup> family.
Des. Codes Cryptogr., 2020

Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis.
CoRR, 2020

A Rank Attack Against Extension Field Cancellation.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Practical Cryptanalysis of k-ary C<sup>*</sup>.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code.
IACR Cryptol. ePrint Arch., 2019

Practical Cryptanalysis of k-ary C.
IACR Cryptol. ePrint Arch., 2019

On the Complexity of "Superdetermined" Minrank Instances.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

2018
Extracting Linearization Equations from Noisy Sources.
IACR Cryptol. ePrint Arch., 2018

EFLASH: A New Multivariate Encryption Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

HFERP - A New Multivariate Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Improved Cryptanalysis of HFEv- via Projection.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

2017
The number of boolean functions with multiplicative complexity 2.
Int. J. Inf. Coding Theory, 2017

Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree.
IACR Cryptol. ePrint Arch., 2017

Total Break of the SRP Encryption Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Key Recovery Attack for All Parameters of HFE-.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

An Updated Security Analysis of PFLASH.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Key Recovery Attack for ZHFE.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

2016
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.
J. Math. Cryptol., 2016

Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Security Analysis and Key Modification for ZHFE.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

On the Differential Security of the HFEv- Signature Primitive.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

2014
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

Differential Properties of the HFE Cryptosystem.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

2013
A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

2012
A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions.
IACR Cryptol. ePrint Arch., 2012

Improved Indifferentiability Security Bound for the JH Mode.
IACR Cryptol. ePrint Arch., 2012

2011
Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier.
IACR Cryptol. ePrint Arch., 2011

On the Differential Security of Multivariate Public Key Cryptosystems.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

2010
Properties of the Discrete Differential with Cryptographic Applications.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010


  Loading...