Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Drinfeld modules are not for isogeny based cryptography., and . IACR Cryptology ePrint Archive, (2019)Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms., and . CoRR, (2019)Classical and quantum dynamic programming for Subset-Sum and variants., , , , and . CoRR, (2021)A simplified approach to rigorous degree 2 elimination in discrete logarithm algorithms., and . Math. Comput., 88 (319): 2485-2496 (2019)Computing Discrete Logarithms., and . IACR Cryptol. ePrint Arch., (2021)Short Signatures from Regular Syndrome Decoding, Revisited., , , , and . IACR Cryptol. ePrint Arch., (2024)Introduction to Identity-Based Cryptography.. Identity-Based Cryptography, volume 2 of Cryptology and Information Security Series, IOS Press, (2009)Yet Another Attack on Vest., and . AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 221-235. Springer, (2008)Fast Correlation Attacks: An Algorithmic Point of View., , and . EUROCRYPT, volume 2332 of Lecture Notes in Computer Science, page 209-221. Springer, (2002)Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables., and . EUROCRYPT, volume 4515 of Lecture Notes in Computer Science, page 361-378. Springer, (2007)