From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementing 128-bit Secure MPKC Signatures., , , , и . IACR Cryptology ePrint Archive, (2017)Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs., , и . IACR Cryptology ePrint Archive, (2017)Correlation Power Analysis on NTRU Prime and Related Countermeasures., , и . IACR Cryptology ePrint Archive, (2019)New Differential-Algebraic Attacks and Reparametrization of Rainbow., , , , и . ACNS, том 5037 из Lecture Notes in Computer Science, стр. 242-257. (2008)Theoretical Analysis of XL over Small Fields., и . ACISP, том 3108 из Lecture Notes in Computer Science, стр. 277-288. Springer, (2004)Multivariates Polynomials for Hashing., и . Inscrypt, том 4990 из Lecture Notes in Computer Science, стр. 358-371. Springer, (2007)The behavior of Wiener indices and polynomials of graphs under five graph decorations., , и . Appl. Math. Lett., 20 (3): 290-295 (2007)Algorithmic Views of Vectorized Polynomial Multipliers - NTRU Prime., , и . ACNS (2), том 14584 из Lecture Notes in Computer Science, стр. 24-46. Springer, (2024)A 4.8mW, 800Mbps Hybrid Crypto SoC for Post-Quantum Secure Neural Interfacing., , , , и . VLSI Technology and Circuits, стр. 1-2. IEEE, (2023)Presorting algorithms: An average-case point of view., , и . Theor. Comput. Sci., 242 (1-2): 29-40 (2000)