Partial key exposure attack on short secret exponent CRT-RSA A May, J Nowakowski, S Sarkar International Conference on the Theory and Application of Cryptology and …, 2021 | 10 | 2021 |
Approximate divisor multiples–factoring with only a third of the secret CRT-exponents A May, J Nowakowski, S Sarkar Annual International Conference on the Theory and Applications of …, 2022 | 6 | 2022 |
Too Many Hints–When LLL Breaks LWE A May, J Nowakowski International Conference on the Theory and Application of Cryptology and …, 2023 | 4 | 2023 |
Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith J Meers, J Nowakowski International Conference on the Theory and Application of Cryptology and …, 2023 | 1 | 2023 |
Entropy Suffices for Key Guessing T Glaser, A May, J Nowakowski Cryptology ePrint Archive, 2023 | 1 | 2023 |
New NTRU Records with Improved Lattice Bases E Kirshanova, A May, J Nowakowski International Conference on Post-Quantum Cryptography, 167-195, 2023 | | 2023 |
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information M Brinkmann, C Chuengsatiansup, A May, J Nowakowski, Y Yarom Cryptology ePrint Archive, 2023 | | 2023 |