Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Search Successive Minima Problem Is Equivalent to Its Optimization Version., and . WISA, volume 10763 of Lecture Notes in Computer Science, page 39-50. Springer, (2017)Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS'15., , and . PQCrypto, volume 11505 of Lecture Notes in Computer Science, page 153-166. Springer, (2019)A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack., , , and . CANS, volume 7092 of Lecture Notes in Computer Science, page 126-137. Springer, (2011)Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs., , , , , and . IACR Cryptol. ePrint Arch., (2024)P/poly Invalidity of the Agr17 Functional Encryption Scheme., , , , and . IACR Cryptol. ePrint Arch., (2021)Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem., and . IACR Cryptology ePrint Archive, (2008)An Efficient Broadcast Attack against NTRU., , , and . IACR Cryptology ePrint Archive, (2011)Cryptanalysis of Compact-LWE Submitted to NIST PQC Project., , , and . IACR Cryptology ePrint Archive, (2018)Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08., , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 455-466. Springer, (2018)Generalized Implicit Factorization Problem., , and . SAC, volume 14201 of Lecture Notes in Computer Science, page 369-384. Springer, (2023)