The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ludovic Perret: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jean-Charles Faugère, Ludovic Perret
    Cryptanalysis of 2R- Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:357-372 [Conf]
  2. Jean-Charles Faugère, Ludovic Perret
    Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:30-47 [Conf]
  3. Ludovic Perret
    A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:354-370 [Conf]
  4. Françoise Levy-dit-Vehel, Ludovic Perret
    Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:275-289 [Conf]
  5. Françoise Levy-dit-Vehel, Ludovic Perret
    Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:235-251 [Conf]
  6. Françoise Levy-dit-Vehel, Ludovic Perret
    On the Wagner-Magyarik Cryptosystem. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:316-329 [Conf]
  7. Ludovic Perret
    On the computational complexity of some equivalence problems of polynomial systems of equations over finite fields [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 2004, v:, n:116, pp:- [Journal]
  8. Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai
    Algebraic Cryptanalysis of 58-Round SHA-1. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:349-365 [Conf]

  9. Security Analysis of Multivariate Polynomials for Hashing. [Citation Graph (, )][DBLP]


  10. Cryptanalysis of MinRank. [Citation Graph (, )][DBLP]


  11. Algebraic Cryptanalysis of McEliece Variants with Compact Keys. [Citation Graph (, )][DBLP]


  12. High order derivatives and decomposition of multivariate polynomials. [Citation Graph (, )][DBLP]


  13. Total Break of the l-IC Signature Scheme. [Citation Graph (, )][DBLP]


  14. Cryptanalysis of the TRMS Signature Scheme of PKC'05. [Citation Graph (, )][DBLP]


  15. Cryptanalysis of the Hidden Matrix Cryptosystem. [Citation Graph (, )][DBLP]


  16. Security analysis of word problem-based cryptosystems. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002