default search action
Ray A. Perlner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Pierre Briaud, Maxime Bros, Ray A. Perlner, Daniel Smith-Tone:
Practical Attack on All Parameters of the DME Signature Scheme. EUROCRYPT (6) 2024: 3-29 - [i19]Pierre Briaud, Maxime Bros, Ray A. Perlner, Daniel Smith-Tone:
Practical Attack on All Parameters of the DME Signature Scheme. IACR Cryptol. ePrint Arch. 2024: 333 (2024) - [i18]Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray A. Perlner, Angela Robinson:
A graph-theoretic approach to analyzing decoding failures of BIKE. IACR Cryptol. ePrint Arch. 2024: 1736 (2024) - 2022
- [c20]Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon:
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. CCS 2022: 979-993 - [c19]John Baena, Pierre Briaud, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone, Javier A. Verbel:
Improving Support-Minors Rank Attacks: Applications to Gđisplaystyle eMSS and Rainbow. CRYPTO (3) 2022: 376-405 - [c18]Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray A. Perlner, Angela Robinson:
A Study of Error Floor Behavior in QC-MDPC Codes. PQCrypto 2022: 89-103 - [c17]Ray A. Perlner, John Kelsey, David A. Cooper:
Breaking Category Five SPHINCS+ with SHA-256. PQCrypto 2022: 501-522 - [i17]Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon:
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. IACR Cryptol. ePrint Arch. 2022: 952 (2022) - [i16]Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray A. Perlner, Angela Robinson:
A Study of Error Floor Behavior in QC-MDPC Codes. IACR Cryptol. ePrint Arch. 2022: 1043 (2022) - [i15]Ray A. Perlner, John Kelsey, David A. Cooper:
Breaking Category Five SPHINCS+ with SHA-256. IACR Cryptol. ePrint Arch. 2022: 1061 (2022) - 2021
- [i14]John Baena, Pierre Briaud, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone, Javier A. Verbel:
Improving Support-Minors rank attacks: applications to GeMSS and Rainbow. IACR Cryptol. ePrint Arch. 2021: 1677 (2021) - 2020
- [c16]Magali Bardet, Maxime Bros, Daniel Cabarcas, Philippe Gaborit, Ray A. Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier A. Verbel:
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems. ASIACRYPT (1) 2020: 507-536 - [c15]Daniel Apon, Ray A. Perlner, Angela Robinson, Paolo Santini:
Cryptanalysis of LEDAcrypt. CRYPTO (3) 2020: 389-418 - [c14]Daniel Apon, Dustin Moody, Ray A. Perlner, Daniel Smith-Tone, Javier A. Verbel:
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme. PQCrypto 2020: 307-322 - [i13]Magali Bardet, Maxime Bros, Daniel Cabarcas, Philippe Gaborit, Ray A. Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier A. Verbel:
Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis. CoRR abs/2002.08322 (2020) - [i12]Daniel Apon, Ray A. Perlner, Angela Robinson, Paolo Santini:
Cryptanalysis of LEDAcrypt. IACR Cryptol. ePrint Arch. 2020: 455 (2020) - [i11]Ray A. Perlner, Daniel Smith-Tone:
Rainbow Band Separation is Better than we Thought. IACR Cryptol. ePrint Arch. 2020: 702 (2020) - [i10]Daniel Apon, Dustin Moody, Ray A. Perlner, Daniel Smith-Tone, Javier A. Verbel:
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 1086 (2020)
2010 – 2019
- 2019
- [c13]Javier A. Verbel, John Baena, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone:
On the Complexity of "Superdetermined" Minrank Instances. PQCrypto 2019: 167-186 - [i9]Javier A. Verbel, John Baena, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone:
On the Complexity of "Superdetermined" Minrank Instances. IACR Cryptol. ePrint Arch. 2019: 731 (2019) - 2018
- [c12]Jintai Ding, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Improved Cryptanalysis of HFEv- via Projection. PQCrypto 2018: 375-395 - [c11]Yasuhiko Ikematsu, Ray A. Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates:
HFERP - A New Multivariate Encryption Scheme. PQCrypto 2018: 396-416 - 2017
- [c10]Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme. PQCrypto 2017: 255-271 - [c9]Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Total Break of the SRP Encryption Scheme. SAC 2017: 355-373 - [i8]Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme. IACR Cryptol. ePrint Arch. 2017: 199 (2017) - [i7]Jintai Ding, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Improved Cryptanalysis of HFEv- via Projection. IACR Cryptol. ePrint Arch. 2017: 1149 (2017) - 2016
- [c8]Dustin Moody, Ray A. Perlner:
Vulnerabilities of "McEliece in the World of Escher". PQCrypto 2016: 104-117 - [c7]Ray A. Perlner, Daniel Smith-Tone:
Security Analysis and Key Modification for ZHFE. PQCrypto 2016: 197-212 - [c6]Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme. SAC 2016: 543-558 - 2015
- [i6]Morris Dworkin, Ray A. Perlner:
Analysis of VAES3 (FF2). IACR Cryptol. ePrint Arch. 2015: 306 (2015) - [i5]Dustin Moody, Ray A. Perlner:
Vulnerabilities of "McEliece in the World of Escher". IACR Cryptol. ePrint Arch. 2015: 966 (2015) - 2014
- [c5]Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme. PQCrypto 2014: 180-196 - [c4]Ray A. Perlner:
Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes. PQCrypto 2014: 220-228 - [i4]Ray A. Perlner:
Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes. IACR Cryptol. ePrint Arch. 2014: 354 (2014) - [i3]Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme. IACR Cryptol. ePrint Arch. 2014: 399 (2014) - 2013
- [c3]Ray A. Perlner, Daniel Smith-Tone:
A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems. PQCrypto 2013: 165-173 - [i2]Ray A. Perlner, Daniel Smith-Tone:
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems". IACR Cryptol. ePrint Arch. 2013: 173 (2013) - 2010
- [c2]Radia J. Perlman, Charlie Kaufman, Ray A. Perlner:
Privacy-preserving DRM. IDtrust 2010: 69-83 - [i1]Alan Mink, Sheila Frankel, Ray A. Perlner:
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration. CoRR abs/1004.0605 (2010)
2000 – 2009
- 2009
- [c1]Ray A. Perlner, David A. Cooper:
Quantum resistant public key cryptography: a survey. IDtrust 2009: 85-93
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint