Ray A. Perlner

According to our database1, Ray A. Perlner authored at least 27 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Practical Attack on All Parameters of the DME Signature Scheme.
IACR Cryptol. ePrint Arch., 2024

2022
Breaking Category Five SPHINCS+ with SHA-256.
IACR Cryptol. ePrint Arch., 2022

When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer.
IACR Cryptol. ePrint Arch., 2022

A Study of Error Floor Behavior in QC-MDPC Codes.
IACR Cryptol. ePrint Arch., 2022

Breaking Category Five SPHINCS<sup>+</sup> with SHA-256.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

Improving Support-Minors Rank Attacks: Applications to Gđisplaystyle eMSS and Rainbow.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Improving Support-Minors rank attacks: applications to GeMSS and Rainbow.
IACR Cryptol. ePrint Arch., 2021

2020
Rainbow Band Separation is Better than we Thought.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of LEDAcrypt.
IACR Cryptol. ePrint Arch., 2020

Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020

Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis.
CoRR, 2020

Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
On the Complexity of "Superdetermined" Minrank Instances.
IACR Cryptol. ePrint Arch., 2019

2018
HFERP - A New Multivariate Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

2017
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme.
IACR Cryptol. ePrint Arch., 2017

Improved Cryptanalysis of HFEv- via Projection.
IACR Cryptol. ePrint Arch., 2017

Total Break of the SRP Encryption Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

2016
Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Security Analysis and Key Modification for ZHFE.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

2015
Vulnerabilities of "McEliece in the World of Escher".
IACR Cryptol. ePrint Arch., 2015

Analysis of VAES3 (FF2).
IACR Cryptol. ePrint Arch., 2015

2014
Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes.
IACR Cryptol. ePrint Arch., 2014

An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme.
IACR Cryptol. ePrint Arch., 2014

2013
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems".
IACR Cryptol. ePrint Arch., 2013

2010
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
CoRR, 2010

Privacy-preserving DRM.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

2009
Quantum resistant public key cryptography: a survey.
Proceedings of the IDtrust 2009, 2009


  Loading...