Joshua Deaton

According to our database1, Joshua Deaton authored at least 9 papers between 2019 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
How Much can F5 Really Do.
IACR Cryptol. ePrint Arch., 2021

The Distinguishing Attack on HFE.
IACR Cryptol. ePrint Arch., 2021

The singularity attack to the multivariate signature scheme HIMQ-3.
Adv. Math. Commun., 2021

The Nested Subset Differential Attack - A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Giophantus distinguishing attack is a low dimensional learning with errors problem.
Adv. Math. Commun., 2020

A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
The Singularity Attack to the Multivariate Signature Scheme Himq-3.
IACR Cryptol. ePrint Arch., 2019

A Simple Key Reuse Attack on Ntru Cryptosystem.
IACR Cryptol. ePrint Arch., 2019


  Loading...