default search action
Daniel Smith-Tone
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Pierre Briaud, Maxime Bros, Ray A. Perlner, Daniel Smith-Tone:
Practical Attack on All Parameters of the DME Signature Scheme. EUROCRYPT (6) 2024: 3-29 - [c28]Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone:
Improved Cryptanalysis of HFERP. Public Key Cryptography (1) 2024: 413-440 - [e3]Markku-Juhani O. Saarinen, Daniel Smith-Tone:
Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14771, Springer 2024, ISBN 978-3-031-62742-2 [contents] - [e2]Markku-Juhani O. Saarinen, Daniel Smith-Tone:
Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14772, Springer 2024, ISBN 978-3-031-62745-3 [contents] - [i27]Pierre Briaud, Maxime Bros, Ray A. Perlner, Daniel Smith-Tone:
Practical Attack on All Parameters of the DME Signature Scheme. IACR Cryptol. ePrint Arch. 2024: 333 (2024) - [i26]Christopher Battarbee, Giacomo Borin, Ryann Cartor, Nadia Heninger, David Jao, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, Rainer Steinwandt:
On the Semidirect Discrete Logarithm Problem in Finite Groups. IACR Cryptol. ePrint Arch. 2024: 905 (2024) - 2023
- [c27]Max Cartor, Ryann Cartor, Mark Lewis, Daniel Smith-Tone:
Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials. IWSEC 2023: 137-151 - [e1]Thomas Johansson, Daniel Smith-Tone:
Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings. Lecture Notes in Computer Science 14154, Springer 2023, ISBN 978-3-031-40002-5 [contents] - [i25]Daniel Smith-Tone:
The Generating Series of Support Minors MinRank Ideals. IACR Cryptol. ePrint Arch. 2023: 1456 (2023) - [i24]Daniel Smith-Tone:
A Total Break of the Scrap Digital Signature Scheme. IACR Cryptol. ePrint Arch. 2023: 1481 (2023) - [i23]Daniel Smith-Tone:
A Total Break of the 3WISE Digital Signature Scheme. IACR Cryptol. ePrint Arch. 2023: 1535 (2023) - 2022
- [c26]John Baena, Pierre Briaud, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone, Javier A. Verbel:
Improving Support-Minors Rank Attacks: Applications to Gđisplaystyle eMSS and Rainbow. CRYPTO (3) 2022: 376-405 - [c25]Ryann Cartor, Max Cartor, Mark Lewis, Daniel Smith-Tone:
IPRainbow. PQCrypto 2022: 170-184 - [c24]Daniel Smith-Tone:
2F - A New Method for Constructing Efficient Multivariate Encryption Schemes. PQCrypto 2022: 185-201 - 2021
- [j5]Daniel Smith-Tone, Cristina Tone:
A multivariate cryptosystem inspired by random linear codes. Finite Fields Their Appl. 69: 101778 (2021) - [c23]Daniel Smith-Tone:
New Practical Multivariate Signatures from a Nonlinear Modifier. PQCrypto 2021: 79-97 - [c22]Morten Øygarden, Daniel Smith-Tone, Javier A. Verbel:
On the Effect of Projection on Rank Attacks in Multivariate Cryptography. PQCrypto 2021: 98-113 - [i22]Daniel Smith-Tone:
New Practical Multivariate Signatures from a Nonlinear Modifier. IACR Cryptol. ePrint Arch. 2021: 429 (2021) - [i21]Morten Øygarden, Daniel Smith-Tone, Javier A. Verbel:
On the Effect of Projection on Rank Attacks in Multivariate Cryptography. IACR Cryptol. ePrint Arch. 2021: 655 (2021) - [i20]John Baena, Pierre Briaud, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone, Javier A. Verbel:
Improving Support-Minors rank attacks: applications to GeMSS and Rainbow. IACR Cryptol. ePrint Arch. 2021: 1677 (2021) - 2020
- [j4]Ryann Cartor, Daniel Smith-Tone:
All in the C* family. Des. Codes Cryptogr. 88(6): 1023-1036 (2020) - [c21]Magali Bardet, Maxime Bros, Daniel Cabarcas, Philippe Gaborit, Ray A. Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier A. Verbel:
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems. ASIACRYPT (1) 2020: 507-536 - [c20]Daniel Apon, Dustin Moody, Ray A. Perlner, Daniel Smith-Tone, Javier A. Verbel:
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme. PQCrypto 2020: 307-322 - [c19]Daniel Smith-Tone:
Practical Cryptanalysis of k-ary C*. PQCrypto 2020: 360-380 - [c18]Daniel Smith-Tone, Javier A. Verbel:
A Rank Attack Against Extension Field Cancellation. PQCrypto 2020: 381-401 - [i19]Magali Bardet, Maxime Bros, Daniel Cabarcas, Philippe Gaborit, Ray A. Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier A. Verbel:
Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis. CoRR abs/2002.08322 (2020) - [i18]Ray A. Perlner, Daniel Smith-Tone:
Rainbow Band Separation is Better than we Thought. IACR Cryptol. ePrint Arch. 2020: 702 (2020) - [i17]Daniel Apon, Dustin Moody, Ray A. Perlner, Daniel Smith-Tone, Javier A. Verbel:
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 1086 (2020)
2010 – 2019
- 2019
- [c17]Javier A. Verbel, John Baena, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone:
On the Complexity of "Superdetermined" Minrank Instances. PQCrypto 2019: 167-186 - [i16]Javier A. Verbel, John Baena, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone:
On the Complexity of "Superdetermined" Minrank Instances. IACR Cryptol. ePrint Arch. 2019: 731 (2019) - [i15]Daniel Smith-Tone:
Practical Cryptanalysis of k-ary C. IACR Cryptol. ePrint Arch. 2019: 841 (2019) - [i14]Daniel Smith-Tone, Cristina Tone:
A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code. IACR Cryptol. ePrint Arch. 2019: 1355 (2019) - 2018
- [c16]Jintai Ding, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Improved Cryptanalysis of HFEv- via Projection. PQCrypto 2018: 375-395 - [c15]Yasuhiko Ikematsu, Ray A. Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates:
HFERP - A New Multivariate Encryption Scheme. PQCrypto 2018: 396-416 - [c14]Ryann Cartor, Daniel Smith-Tone:
EFLASH: A New Multivariate Encryption Scheme. SAC 2018: 281-299 - [i13]Daniel Smith-Tone:
Extracting Linearization Equations from Noisy Sources. IACR Cryptol. ePrint Arch. 2018: 539 (2018) - 2017
- [j3]Magnus Gausdal Find, Daniel Smith-Tone, Meltem Sönmez Turan:
The number of boolean functions with multiplicative complexity 2. Int. J. Inf. Coding Theory 4(4): 222-236 (2017) - [c13]Ryann Cartor, Daniel Smith-Tone:
An Updated Security Analysis of PFLASH. PQCrypto 2017: 241-254 - [c12]Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme. PQCrypto 2017: 255-271 - [c11]Jeremy Vates, Daniel Smith-Tone:
Key Recovery Attack for All Parameters of HFE-. PQCrypto 2017: 272-288 - [c10]Daniel Cabarcas, Daniel Smith-Tone, Javier A. Verbel:
Key Recovery Attack for ZHFE. PQCrypto 2017: 289-308 - [c9]Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Total Break of the SRP Encryption Scheme. SAC 2017: 355-373 - [i12]Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme. IACR Cryptol. ePrint Arch. 2017: 199 (2017) - [i11]Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith-Tone:
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree. IACR Cryptol. ePrint Arch. 2017: 471 (2017) - [i10]Jintai Ding, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Improved Cryptanalysis of HFEv- via Projection. IACR Cryptol. ePrint Arch. 2017: 1149 (2017) - [i9]Ryann Cartor, Daniel Smith-Tone:
EFLASH: A New Multivariate Encryption Scheme. IACR Cryptol. ePrint Arch. 2017: 1184 (2017) - 2016
- [j2]Dustin Moody, Souradyuti Paul, Daniel Smith-Tone:
Improved indifferentiability security bound for the JH mode. Des. Codes Cryptogr. 79(2): 237-259 (2016) - [j1]Dustin Moody, Souradyuti Paul, Daniel Smith-Tone:
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier. J. Math. Cryptol. 10(2): 101-133 (2016) - [c8]Ryann Cartor, Ryan Gipson, Daniel Smith-Tone, Jeremy Vates:
On the Differential Security of the HFEv- Signature Primitive. PQCrypto 2016: 162-181 - [c7]Ray A. Perlner, Daniel Smith-Tone:
Security Analysis and Key Modification for ZHFE. PQCrypto 2016: 197-212 - [c6]Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme. SAC 2016: 543-558 - 2015
- [i8]Magnus Gausdal Find, Daniel Smith-Tone, Meltem Sönmez Turan:
The Number of Boolean Functions with Multiplicative Complexity 2. IACR Cryptol. ePrint Arch. 2015: 1041 (2015) - 2014
- [c5]Taylor Daniels, Daniel Smith-Tone:
Differential Properties of the HFE Cryptosystem. PQCrypto 2014: 59-75 - [c4]Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme. PQCrypto 2014: 180-196 - [i7]Taylor Daniels, Daniel Smith-Tone:
Differential Properties of the HFE Cryptosystem. IACR Cryptol. ePrint Arch. 2014: 398 (2014) - [i6]Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme. IACR Cryptol. ePrint Arch. 2014: 399 (2014) - 2013
- [c3]Ray A. Perlner, Daniel Smith-Tone:
A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems. PQCrypto 2013: 165-173 - [i5]Ray A. Perlner, Daniel Smith-Tone:
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems". IACR Cryptol. ePrint Arch. 2013: 173 (2013) - 2012
- [i4]Dustin Moody, Souradyuti Paul, Daniel Smith-Tone:
Improved Indifferentiability Security Bound for the JH Mode. IACR Cryptol. ePrint Arch. 2012: 278 (2012) - [i3]Daniel Smith-Tone, Cristina Tone:
A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions. IACR Cryptol. ePrint Arch. 2012: 647 (2012) - 2011
- [c2]Daniel Smith-Tone:
On the Differential Security of Multivariate Public Key Cryptosystems. PQCrypto 2011: 130-142 - [i2]Dustin Moody, Souradyuti Paul, Daniel Smith-Tone:
Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier. IACR Cryptol. ePrint Arch. 2011: 630 (2011) - 2010
- [c1]Daniel Smith-Tone:
Properties of the Discrete Differential with Cryptographic Applications. PQCrypto 2010: 1-12
2000 – 2009
- 2009
- [i1]Daniel Smith-Tone:
Properties of the Discrete Differential with Cryptographic Applications. IACR Cryptol. ePrint Arch. 2009: 567 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint