Daniel Smith-Tone

According to our database1, Daniel Smith-Tone authored at least 46 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Practical Attack on All Parameters of the DME Signature Scheme.
IACR Cryptol. ePrint Arch., 2024

Improved Cryptanalysis of HFERP.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
A Total Break of the 3WISE Digital Signature Scheme.
IACR Cryptol. ePrint Arch., 2023

A Total Break of the Scrap Digital Signature Scheme.
IACR Cryptol. ePrint Arch., 2023

The Generating Series of Support Minors MinRank Ideals.
IACR Cryptol. ePrint Arch., 2023

Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials.
Proceedings of the Advances in Information and Computer Security, 2023

2022
2F - A New Method for Constructing Efficient Multivariate Encryption Schemes.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

IPRainbow.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

Improving Support-Minors Rank Attacks: Applications to Gđisplaystyle eMSS and Rainbow.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
New Practical Multivariate Signatures from a Nonlinear Modifier.
IACR Cryptol. ePrint Arch., 2021

On the Effect of Projection on Rank Attacks in Multivariate Cryptography.
IACR Cryptol. ePrint Arch., 2021

Improving Support-Minors rank attacks: applications to GeMSS and Rainbow.
IACR Cryptol. ePrint Arch., 2021

A multivariate cryptosystem inspired by random linear codes.
Finite Fields Their Appl., 2021

2020
Rainbow Band Separation is Better than we Thought.
IACR Cryptol. ePrint Arch., 2020

Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020

All in the C<sup>*</sup> family.
Des. Codes Cryptogr., 2020

Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis.
CoRR, 2020

A Rank Attack Against Extension Field Cancellation.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Practical Cryptanalysis of k-ary C<sup>*</sup>.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
On the Complexity of "Superdetermined" Minrank Instances.
IACR Cryptol. ePrint Arch., 2019

A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code.
IACR Cryptol. ePrint Arch., 2019

Practical Cryptanalysis of k-ary C.
IACR Cryptol. ePrint Arch., 2019

2018
Extracting Linearization Equations from Noisy Sources.
IACR Cryptol. ePrint Arch., 2018

HFERP - A New Multivariate Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

2017
The number of boolean functions with multiplicative complexity 2.
Int. J. Inf. Coding Theory, 2017

Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme.
IACR Cryptol. ePrint Arch., 2017

Improved Cryptanalysis of HFEv- via Projection.
IACR Cryptol. ePrint Arch., 2017

EFLASH: A New Multivariate Encryption Scheme.
IACR Cryptol. ePrint Arch., 2017

Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree.
IACR Cryptol. ePrint Arch., 2017

Total Break of the SRP Encryption Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Key Recovery Attack for All Parameters of HFE-.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

An Updated Security Analysis of PFLASH.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Key Recovery Attack for ZHFE.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

2016
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.
J. Math. Cryptol., 2016

Improved indifferentiability security bound for the JH mode.
Des. Codes Cryptogr., 2016

Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Security Analysis and Key Modification for ZHFE.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

On the Differential Security of the HFEv- Signature Primitive.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

2014
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme.
IACR Cryptol. ePrint Arch., 2014

Differential Properties of the HFE Cryptosystem.
IACR Cryptol. ePrint Arch., 2014

2013
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems".
IACR Cryptol. ePrint Arch., 2013

2012
A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions.
IACR Cryptol. ePrint Arch., 2012

2011
Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier.
IACR Cryptol. ePrint Arch., 2011

On the Differential Security of Multivariate Public Key Cryptosystems.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

2009
Properties of the Discrete Differential with Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2009


  Loading...