| Efficient algorithms for solving overdefined systems of multivariate polynomial equations N Courtois, A Klimov, J Patarin, A Shamir International Conference on the Theory and Applications of Cryptographic …, 2000 | 1252 | 2000 |
| Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms J Patarin International conference on the theory and applications of cryptographic …, 1996 | 1179 | 1996 |
| DES and differential power analysis the “Duplication” method L Goubin, J Patarin International Workshop on Cryptographic Hardware and Embedded Systems, 158-172, 1999 | 971 | 1999 |
| Unbalanced oil and vinegar signature schemes A Kipnis, J Patarin, L Goubin International Conference on the Theory and Applications of Cryptographic …, 1999 | 908 | 1999 |
| Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt’88 J Patarin Annual International Cryptology Conference, 248-261, 1995 | 666 | 1995 |
| The “coefficients H” technique J Patarin International Workshop on Selected Areas in Cryptography, 328-345, 2008 | 407 | 2008 |
| QUARTZ, 128-Bit Long Digital Signatures: http://www. minrank. org/quartz J Patarin, N Courtois, L Goubin Cryptographers’ Track at the RSA Conference, 282-297, 2001 | 301 | 2001 |
| Low-exponent RSA with related messages D Coppersmith, M Franklin, J Patarin, M Reiter International Conference on the Theory and Applications of Cryptographic …, 1996 | 273 | 1996 |
| FLASH, a Fast Multivariate Signature Algorithm: http://www. minrank. org/flash J Patarin, N Courtois, L Goubin Cryptographers’ Track at the RSA Conference, 298-307, 2001 | 247 | 2001 |
| The oil and vinegar signature scheme J Patarin Presented at the Dagstuhl Workshop on Cryptography September 1997, 1997 | 245 | 1997 |
| Security of random Feistel schemes with 5 or more rounds J Patarin Annual International Cryptology Conference, 106-122, 2004 | 202 | 2004 |
| C−+* and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai J Patarin, L Goubin, N Courtois International Conference on the Theory and Application of Cryptology and …, 1998 | 201 | 1998 |
| Trapdoor one-way permutations and multivariate polynomials J Patarin, L Goubin International Conference on Information and Communications Security, 356-368, 1997 | 201 | 1997 |
| The random oracle model and the ideal cipher model are equivalent JS Coron, J Patarin, Y Seurin Annual International Cryptology Conference, 1-20, 2008 | 197 | 2008 |
| GeMSS: a great multivariate short signature A Casanova, JC Faugere, G Macario-Rat, J Patarin, L Perret, ... UPMC-Paris 6 Sorbonne Universités; INRIA Paris Research Centre, MAMBA Team …, 2017 | 181 | 2017 |
| QUAD: A practical stream cipher with provable security C Berbain, H Gilbert, J Patarin Annual International Conference on the Theory and Applications of …, 2006 | 161 | 2006 |
| New results on pseudorandom permutation generators based on the DES scheme J Patarin Annual International Cryptology Conference, 301-312, 1991 | 153 | 1991 |
| Improved algorithms for isomorphisms of polynomials J Patarin, L Goubin, N Courtois International Conference on the Theory and Applications of Cryptographic …, 1998 | 145 | 1998 |
| About the XL Algorithm over GF(2) NT Courtois, J Patarin Cryptographers’ Track at the RSA Conference, 141-157, 2003 | 143 | 2003 |
| Luby-Rackoff: 7 Rounds Are Enough for 2n(1 − ε) Security J Patarin Annual International Cryptology Conference, 513-529, 2003 | 140 | 2003 |