Quantum money from hidden subspaces, Proceedings of the 44th symposium on Theory of Computing, STOC '12, pp.41-60, 2012. ,
DOI : 10.1145/2213977.2213983
On the complexity of Gröbner basis computation of semiregular overdetermined algebraic equations, Proc. of International Conference on Polynomial System Solving (ICPSS), pp.71-75, 2004. ,
On the Complexity of the F5 Gr¨bnerGr¨ Gr¨bner basis Algorithm, Journal of Symbolic Computation, pp.1-24, 2014. ,
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems, Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry, 2005. ,
Quantum Cryptography, or Unforgeable Subway Tokens, Proceedings of CRYPTO, pp.267-275, 1982. ,
DOI : 10.1007/978-1-4757-0602-4_26
The Magma Algebra System I: The User Language, Journal of Symbolic Computation, vol.24, issue.3-4, pp.3-4235, 1997. ,
DOI : 10.1006/jsco.1996.0125
Determinants and rank of random matrices over Zm, Discrete Math, vol.66, pp.35-50, 1987. ,
Ein Algorithmus zum Auffinden der Basiselemente des Restklassenringes nach einem nulldimensionalen Polynomideal, 1965. ,
Bruno Buchberger???s PhD thesis 1965: An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal, Journal of Symbolic Computation, vol.41, issue.3-4, pp.3-4475, 2006. ,
DOI : 10.1016/j.jsc.2005.09.007
Comments on the translation of my PhD thesis, Journal of Symbolic Computation, vol.41, issue.3-4, pp.471-474, 2006. ,
DOI : 10.1016/j.jsc.2005.09.008
Algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology -EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, volume 2656 of Lecture Notes in Computer Science, pp.345-359, 2003. ,
Quantum money from knots, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on, ITCS '12, pp.276-289, 2012. ,
DOI : 10.1145/2090236.2090260
URL : http://arxiv.org/abs/1004.5127
A new efficient algorithm for computing Gr??bner bases (F4), Journal of Pure and Applied Algebra, vol.139, issue.1-3, pp.61-88, 1999. ,
DOI : 10.1016/S0022-4049(99)00005-5
A new efficient algorithm for computing Gröbner bases without reduction to zero (F5), International Symposium on Symbolic and Algebraic Computation-ISAAC 2002, pp.75-83, 2002. ,
Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using gröbner bases, Advances in Cryptology -CRYPTO 2003, 23rd Annual International Cryptology Conference Proceedings, volume 2729 of Lecture Notes in Computer Science, pp.44-60, 2003. ,
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects, Advances in Cryptology -EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.30-47, 2006. ,
DOI : 10.1007/11761679_3
Quantum money with classical verification, pp.42-52, 2012. ,
Quantum coins. Error-Correcting Codes, Finite Geometry and Cryptography, pp.35-47, 2010. ,
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, Advances in Cryptology -EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, pp.33-48, 1996. ,
DOI : 10.1007/3-540-68339-9_4
Conjugate coding, ACM SIGACT News, vol.15, issue.1, pp.78-88, 1983. ,
DOI : 10.1145/1008908.1008920