Eric Brier

According to our database1, Eric Brier authored at least 33 papers between 2001 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Note on the Ramanujan Machine.
CoRR, 2022

2021
Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More.
IACR Cryptol. ePrint Arch., 2021

Discovering New L-Function Relations Using Algebraic Sieving.
IACR Cryptol. ePrint Arch., 2021

Near-Optimal Pool Testing under Urgency Constraints.
CoRR, 2021

2020
A Fractional 3n+1 Conjecture.
CoRR, 2020

The Look-and-Say The Biggest Sequence Eventually Cycles.
CoRR, 2020

Stuttering Conway Sequences Are Still Conway Sequences.
CoRR, 2020

Optimal Covid-19 Pool Testing with a priori Information.
CoRR, 2020

2019
The Thirteenth Power Residue Symbol.
IACR Cryptol. ePrint Arch., 2019

New Number-Theoretic Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2019

2017
Exploring Naccache-Stern Knapsack Encryption.
IACR Cryptol. ePrint Arch., 2017

2015
A Number-Theoretic Error-Correcting Code.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

2014
How to Sign Paper Contracts? Conjectures and Evidence Related to Equitable and Efficient Collaborative Task Scheduling.
Proceedings of the Open Problems in Mathematics and Computational Science, 2014

2013
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling.
IACR Cryptol. ePrint Arch., 2013

2012
Defensive Leakage Camouflage.
IACR Cryptol. ePrint Arch., 2012

How to Scatter a Secret?
Cryptologia, 2012

2011
Modulus fault attacks against RSA-CRT signatures.
J. Cryptogr. Eng., 2011

2010
A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

New Families of ECM Curves for Cunningham Numbers.
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010

2009
Factoring Unbalanced Moduli with Known Bits.
IACR Cryptol. ePrint Arch., 2009

Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
IACR Cryptol. ePrint Arch., 2009

Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.
IACR Cryptol. ePrint Arch., 2009

Cryptanalysis of CubeHash.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Inside the Hypercube.
IACR Cryptol. ePrint Arch., 2008

2006
Why One Should Also Secure RSA Public Key Elements.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

2004
Correlation Power Analysis with a Leakage Model.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2003
Chemical Combinatorial Attacks on Keyboards.
IACR Cryptol. ePrint Arch., 2003

Optimal Statistical Power Analysis.
IACR Cryptol. ePrint Arch., 2003

Classification of Boolean cubic forms of nine variables.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

Fast Point Multiplication on Elliptic Curves through Isogenies.
Proceedings of the Applied Algebra, 2003

2002
Weierstraß Elliptic Curves and Side-Channel Attacks.
Proceedings of the Public Key Cryptography, 2002

2001
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding.
Proceedings of the Advances in Cryptology, 2001

Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001


  Loading...