TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 37.

Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar
Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar (eds.) (2013):
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing, Springer, pp. 157 - 158, DOI: 10.1007/s00200-013-0199-7,
[Book Section]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes (2013):
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, pp. 255 - 275, 24, (3 - 4), DOI: 10.1007/s00200-013-0190-3,
[Article]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, ISBN 978-3-642-38615-2,
[Conference or Workshop Item]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes
Dawson, E. (ed.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: RSA Conference Cryptographer's Track (CT-RSA 2013), Springer, In: Lecture Notes in Computer Science, 7779, [Conference or Workshop Item]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), pp. 997-1022 (2014), DOI: 10.1007/s10623-013-9840-5,
[Article]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, pp. 139-156, [Article]

Petzoldt, Albrecht and Bulygin, Stanislav (2012):
Linear Recurring Sequences for the UOV Key Generation Revisited.
In: The 15th Annual International Conference on Information Security and Cryptology (ICISC 2012), Springer 2013, Seoul, Korea, In: Lecture Notes in Computer Science, ISBN 978-3-642-37681-8,
[Conference or Workshop Item]

Walter, Michael and Bulygin, Stanislav and Buchmann, Johannes
Kutylowski, Miroslaw and Yung, Moti (eds.) (2012):
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
In: The 8th China International Conference on Information Security and Cryptology (Inscrypt 2012), Springer, Beijing, China, In: Lecture Notes in Computer Science, 7763, ISBN 978-3-642-38518-6,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, IEEE, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference or Workshop Item]

Niebuhr, Robert and Meziani, Mohammed and Bulygin, Stanislav and Buchmann, Johannes (2012):
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, pp. 137-147, 11, (3), [Article]

Bulygin, Stanislav and Walter, Michael (2012):
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
(2012/085), [Report]

Bulygin, Stanislav and Buchmann, Johannes
Lin, Dongdai and Tsudik, Gene and Wang, Xiaoyun (eds.) (2011):
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Proceedings of The 10th International Conference on Cryptography and Network Security (CANS 2011), Springer, Sanya, China, In: Lecture Notes in Computer Science, 7092, ISBN 978-3-642-25512-0,
[Conference or Workshop Item]

Petzoldt, Albrecht and Thomae, Enrico and Bulygin, Stanislav and Wolf, Christopher
Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
In: Proceedings of "Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011)", Springer, In: Lecture Notes in Computer Science, 6917, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, Springer, Brno, Czech Republic, In: Communications in Computer and Information Science, 200, DOI: 10.1007/978-3-642-23141-4_7,
[Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Catalano, Dario and Fazio, Nelly and Gennaro, Rosario and Nicolosi, Antonio (eds.) (2011):
Linear Recurring Sequences for the UOV Key Generation.
In: Proceedings of PKC 2011, Springer, In: LNCS, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes (2011):
Improved Differential Fault Analysis of Trivium.
In: Proceedings of COSADE 2011, Darmstadt, [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Gong, G. and Gupta, K. C. (eds.) (2010):
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Proceedings of IndoCrypt 2010, Springer, In: Lecture Notes in Computer Science, 6498, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Cabarcas, Daniel and Ding, Jintai and Buchmann, Johannes and Bulygin, Stanislav
Lee, Donghoon and Hong, Seokhie (eds.) (2010):
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
In: Proceedings of the 12th International Conference on Information Security and Cryptography - ICISC 2009, Springer, Seoul, Korea, Lecture Notes in Computer, ISBN 978-3-642-14422-6,
DOI: 10.1007/978-3-642-14423-3_7,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Bulygin, Stanislav and Ding, Jintai and Buchmann, Johannes and Werner, Fabian
Heng, S.-H. and Wright, R. N. and Goi, B.-M. (eds.) (2010):
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
In: Proceedings of The Ninth International Conference on Cryptology And Network Security (CANS 2010), Springer, Kuala Lumpur, Malaysia, In: Lecture Notes in Computer Science, ISBN 978-3-642-17618-0,
DOI: 10.1007/978-3-642-17619-7_11,
[Conference or Workshop Item]

Bulygin, Stanislav and Petzoldt, Albrecht and Buchmann, Johannes
Gong, G. and Gupta, K. C. (eds.) (2010):
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Proceedings of IndoCrypt 2010, Springer, In: Lecture Notes in Computer Science, 6498, [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Cid, Carlos and Faugere, Jean-Charles (eds.) (2010):
A Multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Niebuhr, Robert and Cayrel, Pierre-Louis and Bulygin, Stanislav and Buchmann, Johannes (2010):
On lower bounds for Information Set Decoding over F_q.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Ding, Jintai and Kleinjung, Thorsten and Bulygin, Stanislav and Buchmann, Johannes
Cid, Carlos and Faugere, Jean-Charles (eds.) (2010):
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Sendrier, Nicolas (ed.) (2010):
Selecting Parameters for the Rainbow Signature Scheme.
In: Proceedings of PQCrypto 2010, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Bulygin, Stanislav and Pellikaan, Ruud
Woungang, Isaac and Misra, Sudip and Misra, Subhas Chandra (eds.) (2010):
Decoding and Finding the Minimum Distance with Gröbner Bases: History and New Insights.
In: Selected Topics in Information and Coding Theory, World Scientific, pp. 585-622, [Book Section]

Bulygin, Stanislav and Brickenstein, Michael (2010):
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", pp. 185-200, 2, (3), DOI: 10.1007/s11786-009-0020-y,
[Article]

Niebuhr, Robert and Cayrel, Pierre-Louis and Bulygin, Stanislav and Buchmann, Johannes (2010):
Attacking code/lattice-based cryptosystems using Partial Knowledge.
In: Proceedings of Inscrypt 2010, China Press, [Conference or Workshop Item]

Bulygin, Stanislav and Pellikaan, Ruud (2009):
Bounded distance decoding of linear error-correcting codes with Gröbner bases.
In: Journal of Symbolic Computation, pp. 1626-1643, Special Issue "Gröbner Ba, (Issue 12), DOI: 10.1016/j.jsc.2007.12.003,
[Article]

Bras-Amoros, Maria and Bulygin, Stanislav (2009):
Towards a Better Understanding of the Semigroup Tree.
In: Semigroup Forum, pp. 561-574, 79, (3), DOI: 10.1007/s00233-009-9175-8,
[Article]

Bulygin, Stanislav (2009):
Computer algebra in coding theory and cryptanalysis: Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Südwestdeutscher Verlag für Hochschulschriften, ISBN 978-3-8381-0948-0,
[Book]

Bulygin, Stanislav (2009):
Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Technische Universität Kaiserslautern, [Ph.D. Thesis]

Bulygin, Stanislav and Pellikaan, Ruud
Sala, M. and Mora, T. and Perret, L. and Sakata, S. and Traverso, C. (eds.) (2009):
Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases.
In: Gröbner Bases, Coding, and Cryptography, Springer, pp. 361-365, [Book Section]

Brickenstein, Michael and Bulygin, Stanislav
Faugere, J.-C. and Wang, D. (eds.) (2008):
Attacking AES via Solving Systems in the Key Variables Only.
In: First International Conference on Symbolic Computation and Cryptography, Beijing, China, April 28-30, [Conference or Workshop Item]

Bulygin, Stanislav and Pellikaan, Ruud (2007):
Decoding error-correcting codes with Groebner bases.
In: Proceedings of the 28-th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 24-25, [Conference or Workshop Item]

Bulygin, Stanislav (2006):
Generalized Hermitian Codes over GF(2^r).
In: IEEE Transactions on Information Theory, pp. 4664-4669, 52, (10), DOI: 10.1109/TIT.2006.881831,
[Article]

Bulygin, Stanislav (2006):
Some Problems from Coding Theory and Cryptography.
Technische Universität Kaiserslautern, [Master Thesis]

Bulygin, Stanislav (2003):
On estimation of one cryptographic function using algebraic geometric codes technique.
In: Bulletin of the University of Kiev, Series: Physics&Mathematics, pp. 24-28, (2), [Article]

This list was generated on Sat Oct 19 01:13:33 2019 CEST.