Ray A. Perlner

According to our database1, Ray A. Perlner authored at least 31 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Practical Attack on All Parameters of the HPPC Signature Scheme.
IACR Cryptol. ePrint Arch., 2025

Error floor prediction with Markov models for QC-MDPC codes.
IACR Cryptol. ePrint Arch., 2025

Error Floor Prediction with Markov Models for QC-MDPC Codes.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
A graph-theoretic approach to analyzing decoding failures of BIKE.
IACR Cryptol. ePrint Arch., 2024

Practical Attack on All Parameters of the DME Signature Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2022
Breaking Category Five SPHINCS+ with SHA-256.
IACR Cryptol. ePrint Arch., 2022

Breaking Category Five SPHINCS<sup>+</sup> with SHA-256.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

A Study of Error Floor Behavior in QC-MDPC Codes.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

Improving Support-Minors Rank Attacks: Applications to Gđisplaystyle eMSS and Rainbow.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Improving Support-Minors rank attacks: applications to GeMSS and Rainbow.
IACR Cryptol. ePrint Arch., 2021

2020
Rainbow Band Separation is Better than we Thought.
IACR Cryptol. ePrint Arch., 2020

Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis.
CoRR, 2020

Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Cryptanalysis of LEDAcrypt.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
On the Complexity of "Superdetermined" Minrank Instances.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

2018
HFERP - A New Multivariate Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Improved Cryptanalysis of HFEv- via Projection.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

2017
Total Break of the SRP Encryption Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

2016
Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Security Analysis and Key Modification for ZHFE.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

Vulnerabilities of "McEliece in the World of Escher".
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

2015
Analysis of VAES3 (FF2).
IACR Cryptol. ePrint Arch., 2015

2014
Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

2013
A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

2010
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
CoRR, 2010

Privacy-preserving DRM.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

2009
Quantum resistant public key cryptography: a survey.
Proceedings of the IDtrust 2009, 2009


  Loading...