Gilles Macario-Rat

Orcid: 0000-0002-6156-8295

According to our database1, Gilles Macario-Rat authored at least 23 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Rectangular Attack on VOX.
IACR Cryptol. ePrint Arch., 2023

Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy.
Proceedings of the Mobile, Secure, and Programmable Networking, 2023

2022
A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV.
IACR Cryptol. ePrint Arch., 2022

2021
Onyx: New Encryption and Signature Schemes with Multivariate Public Key in Degree 3.
IACR Cryptol. ePrint Arch., 2021

UOV-Pepper: New Public Key Short Signature in Degree 3.
IACR Cryptol. ePrint Arch., 2021

Ariadne Thread and Salt: New Multivariate Cryptographic Schemes with Public Keys in Degree 3.
IACR Cryptol. ePrint Arch., 2021

2020
Ultra-Short Multivariate Public Key Signatures.
IACR Cryptol. ePrint Arch., 2020

A White-Box Encryption Scheme using Physically Unclonable Functions.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
On the complexity of the Permuted Kernel Problem.
IACR Cryptol. ePrint Arch., 2019

White-Box Traitor-Tracing from Tardos Probabilistic Codes.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

PKP-Based Signature Scheme.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

2018
PKP-Based Signature Scheme.
IACR Cryptol. ePrint Arch., 2018

Combinatorial Digital Signature Scheme.
Proceedings of the 1st International Conference on Big Data and Cyber-Security Intelligence, 2018

2017
Two-Face: New Public Key Multivariate Schemes.
IACR Cryptol. ePrint Arch., 2017

2016
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones.
IACR Cryptol. ePrint Arch., 2016

A Cryptographic Analysis of UMTS/LTE AKA.
IACR Cryptol. ePrint Arch., 2016

2014
Solving the "Isomorphism of Polynomials with Two Secrets" Problem for all Pairs of Quadratic Forms.
CoRR, 2014

2013
New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography.
IACR Cryptol. ePrint Arch., 2013

New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2011
Practical Key-recovery For All Possible Parameters of SFLASH.
IACR Cryptol. ePrint Arch., 2011

2009
Cryptanalysis of the Square Cryptosystems.
Proceedings of the Advances in Cryptology, 2009

2008
Total Break of the <i>l</i>-IC Signature Scheme.
Proceedings of the Public Key Cryptography, 2008

Key Recovery on Hidden Monomial Multivariate Schemes.
Proceedings of the Advances in Cryptology, 2008


  Loading...