Search the dblp DataBase
Ludovic Perret :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jean-Charles Faugère , Ludovic Perret Cryptanalysis of 2R^{-} Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:357-372 [Conf ] Jean-Charles Faugère , Ludovic Perret Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:30-47 [Conf ] Ludovic Perret A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:354-370 [Conf ] Françoise Levy-dit-Vehel , Ludovic Perret Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:275-289 [Conf ] Françoise Levy-dit-Vehel , Ludovic Perret Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:235-251 [Conf ] Françoise Levy-dit-Vehel , Ludovic Perret On the Wagner-Magyarik Cryptosystem. [Citation Graph (0, 0)][DBLP ] WCC, 2005, pp:316-329 [Conf ] Ludovic Perret On the computational complexity of some equivalence problems of polynomial systems of equations over finite fields [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 2004, v:, n:116, pp:- [Journal ] Makoto Sugita , Mitsuru Kawazoe , Ludovic Perret , Hideki Imai Algebraic Cryptanalysis of 58-Round SHA-1. [Citation Graph (0, 0)][DBLP ] FSE, 2007, pp:349-365 [Conf ] Security Analysis of Multivariate Polynomials for Hashing. [Citation Graph (, )][DBLP ] Cryptanalysis of MinRank. [Citation Graph (, )][DBLP ] Algebraic Cryptanalysis of McEliece Variants with Compact Keys. [Citation Graph (, )][DBLP ] High order derivatives and decomposition of multivariate polynomials. [Citation Graph (, )][DBLP ] Total Break of the l -IC Signature Scheme. [Citation Graph (, )][DBLP ] Cryptanalysis of the TRMS Signature Scheme of PKC'05. [Citation Graph (, )][DBLP ] Cryptanalysis of the Hidden Matrix Cryptosystem. [Citation Graph (, )][DBLP ] Security analysis of word problem-based cryptosystems. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs