TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 37.

Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (eds.) (2013):
Foreword: computer algebra in coding theory and cryptography.
24, In: Applicable Algebra in Engineering, Communication and Computing, pp. 157 - 158, Springer, DOI: 10.1007/s00200-013-0199-7,
[Book Section]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes (2013):
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, 24 (3 - 4), pp. 255 - 275. DOI: 10.1007/s00200-013-0190-3,
[Article]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
In: LNCS, In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, pp. 188-202,
Springer, Limoges, France, ISBN 978-3-642-38615-2,
[Conference or Workshop Item]

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
Dawson, E. (ed.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: Lecture Notes in Computer Science, 7779, In: RSA Conference Cryptographer's Track (CT-RSA 2013), pp. 189–206,
Springer, [Conference or Workshop Item]

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), pp. 997-1022 (2014). DOI: 10.1007/s10623-013-9840-5,
[Article]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, pp. 139-156. [Article]

Petzoldt, Albrecht ; Bulygin, Stanislav (2012):
Linear Recurring Sequences for the UOV Key Generation Revisited.
In: Lecture Notes in Computer Science, In: The 15th Annual International Conference on Information Security and Cryptology (ICISC 2012), pp. 441-455,
Springer 2013, Seoul, Korea, ISBN 978-3-642-37681-8,
[Conference or Workshop Item]

Walter, Michael ; Bulygin, Stanislav ; Buchmann, Johannes
Kutylowski, Miroslaw ; Yung, Moti (eds.) (2012):
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
In: Lecture Notes in Computer Science, 7763, In: The 8th China International Conference on Information Security and Cryptology (Inscrypt 2012), pp. 175-197,
Springer, Beijing, China, ISBN 978-3-642-38518-6,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 146 - 151,
IEEE, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference or Workshop Item]

Niebuhr, Robert ; Meziani, Mohammed ; Bulygin, Stanislav ; Buchmann, Johannes (2012):
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, 11 (3), pp. 137-147. [Article]

Bulygin, Stanislav ; Walter, Michael (2012):
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
(2012/085), [Report]

Bulygin, Stanislav ; Buchmann, Johannes
Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (eds.) (2011):
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Lecture Notes in Computer Science, 7092, In: Proceedings of The 10th International Conference on Cryptography and Network Security (CANS 2011), pp. 54-75,
Springer, Sanya, China, ISBN 978-3-642-25512-0,
[Conference or Workshop Item]

Petzoldt, Albrecht ; Thomae, Enrico ; Bulygin, Stanislav ; Wolf, Christopher
Preneel, Bart ; Takagi, Tsuyoshi (eds.) (2011):
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
In: Lecture Notes in Computer Science, 6917, In: Proceedings of "Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011)", pp. 475-490,
Springer, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) (2011):
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
In: Communications in Computer and Information Science, 200, In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, pp. 62-71,
Springer, Brno, Czech Republic, DOI: 10.1007/978-3-642-23141-4_7,
[Conference or Workshop Item]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Catalano, Dario ; Fazio, Nelly ; Gennaro, Rosario ; Nicolosi, Antonio (eds.) (2011):
Linear Recurring Sequences for the UOV Key Generation.
In: LNCS, In: Proceedings of PKC 2011, pp. 335-350,
Springer, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes (2011):
Improved Differential Fault Analysis of Trivium.
In: Proceedings of COSADE 2011, pp. 147-158,
Darmstadt, [Conference or Workshop Item]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Gong, G. ; Gupta, K. C. (eds.) (2010):
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Lecture Notes in Computer Science, 6498, In: Proceedings of IndoCrypt 2010, pp. 33–-48,
Springer, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam ; Cabarcas, Daniel ; Ding, Jintai ; Buchmann, Johannes ; Bulygin, Stanislav
Lee, Donghoon ; Hong, Seokhie (eds.) (2010):
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
Lecture Notes in Computer, In: Proceedings of the 12th International Conference on Information Security and Cryptography - ICISC 2009, pp. 87-100,
Springer, Seoul, Korea, ISBN 978-3-642-14422-6,
DOI: 10.1007/978-3-642-14423-3_7,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed ; Bulygin, Stanislav ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian
Heng, S.-H. ; Wright, R. N. ; Goi, B.-M. (eds.) (2010):
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
In: Lecture Notes in Computer Science, In: Proceedings of The Ninth International Conference on Cryptology And Network Security (CANS 2010), pp. 140–-155,
Springer, Kuala Lumpur, Malaysia, ISBN 978-3-642-17618-0,
DOI: 10.1007/978-3-642-17619-7_11,
[Conference or Workshop Item]

Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
Gong, G. ; Gupta, K. C. (eds.) (2010):
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Lecture Notes in Computer Science, 6498, In: Proceedings of IndoCrypt 2010, pp. 17–-32,
Springer, [Conference or Workshop Item]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Cid, Carlos ; Faugere, Jean-Charles (eds.) (2010):
A Multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), pp. 229-235,
[Conference or Workshop Item]

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010):
On lower bounds for Information Set Decoding over F_q.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), pp. 143-157,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed ; Ding, Jintai ; Kleinjung, Thorsten ; Bulygin, Stanislav ; Buchmann, Johannes
Cid, Carlos ; Faugere, Jean-Charles (eds.) (2010):
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), pp. 89-100,
[Conference or Workshop Item]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Sendrier, Nicolas (ed.) (2010):
Selecting Parameters for the Rainbow Signature Scheme.
In: Lecture Notes in Computer Science, In: Proceedings of PQCrypto 2010, pp. 218-240,
Springer, [Conference or Workshop Item]

Bulygin, Stanislav ; Pellikaan, Ruud
Woungang, Isaac ; Misra, Sudip ; Misra, Subhas Chandra (eds.) (2010):
Decoding and Finding the Minimum Distance with Gröbner Bases: History and New Insights.
In: Selected Topics in Information and Coding Theory, pp. 585-622, World Scientific, ISBN 978-981-283-716-5,
[Book Section]

Bulygin, Stanislav ; Brickenstein, Michael (2010):
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", 2 (3), pp. 185-200. DOI: 10.1007/s11786-009-0020-y,
[Article]

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010):
Attacking code/lattice-based cryptosystems using Partial Knowledge.
In: Proceedings of Inscrypt 2010,
China Press, [Conference or Workshop Item]

Bulygin, Stanislav ; Pellikaan, Ruud (2009):
Bounded distance decoding of linear error-correcting codes with Gröbner bases.
In: Journal of Symbolic Computation, 44 (12), pp. 1626-1643. DOI: 10.1016/j.jsc.2007.12.003,
[Article]

Bras-Amoros, Maria ; Bulygin, Stanislav (2009):
Towards a Better Understanding of the Semigroup Tree.
In: Semigroup Forum, 79 (3), pp. 561-574. DOI: 10.1007/s00233-009-9175-8,
[Article]

Bulygin, Stanislav (2009):
Computer algebra in coding theory and cryptanalysis: Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Saarbrücken, Südwestdeutscher Verlag für Hochschulschriften, ISBN 978-3-8381-0948-0,
[Book]

Bulygin, Stanislav (2009):
Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Technische Universität Kaiserslautern,
[Ph.D. Thesis]

Bulygin, Stanislav ; Pellikaan, Ruud
Sala, M. ; Mora, T. ; Perret, L. ; Sakata, S. ; Traverso, C. (eds.) (2009):
Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases.
In: Gröbner Bases, Coding, and Cryptography, pp. 361-365, Springer, ISBN 978-3-540-93805-7,
[Book Section]

Brickenstein, Michael ; Bulygin, Stanislav
Faugere, J.-C. ; Wang, D. (eds.) (2008):
Attacking AES via Solving Systems in the Key Variables Only.
In: First International Conference on Symbolic Computation and Cryptography, Beijing, China, April 28-30, pp. 118-123,
[Conference or Workshop Item]

Bulygin, Stanislav ; Pellikaan, Ruud (2007):
Decoding error-correcting codes with Groebner bases.
In: Proceedings of the 28-th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 24-25, pp. 3-10,
[Conference or Workshop Item]

Bulygin, Stanislav (2006):
Generalized Hermitian Codes over GF(2^r).
In: IEEE Transactions on Information Theory, 52 (10), pp. 4664-4669. DOI: 10.1109/TIT.2006.881831,
[Article]

Bulygin, Stanislav (2006):
Some Problems from Coding Theory and Cryptography.
Technische Universität Kaiserslautern, [Master Thesis]

Bulygin, Stanislav (2003):
On estimation of one cryptographic function using algebraic geometric codes technique.
In: Bulletin of the University of Kiev, Series: Physics&Mathematics, (2), pp. 24-28. [Article]

This list was generated on Tue Jun 6 01:03:42 2023 CEST.