Cited By
View all- Duff TKorotynskiy VPajdla TRegan M(2023)Using monodromy to recover symmetries of polynomial systemsProceedings of the 2023 International Symposium on Symbolic and Algebraic Computation10.1145/3597066.3597106(251-259)Online publication date: 24-Jul-2023
- Minaud BDerbez PFouque PKarpman P(2018)Key-Recovery Attacks on ASASAJournal of Cryptology10.1007/s00145-017-9272-x31:3(845-884)Online publication date: 1-Jul-2018
- Biryukov ABouillaguet CKhovratovich D(2014)Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)Advances in Cryptology – ASIACRYPT 201410.1007/978-3-662-45611-8_4(63-84)Online publication date: 2014
- Show More Cited By