Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret Keys in Genus-2 SIDH., , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 483-507. Springer, (2021)An adaptive attack on Genus-2 SIDH., , and . IACR Cryptol. ePrint Arch., (2021)Password-Authenticated Key Exchange from Group Actions., , , , and . CRYPTO (2), volume 13508 of Lecture Notes in Computer Science, page 699-728. Springer, (2022)Efficient Computation of (3n,3n)-Isogenies., and . AFRICACRYPT, volume 14064 of Lecture Notes in Computer Science, page 53-78. Springer, (2023)Failing to hash into supersingular isogeny graphs., , , , , , , , , and 5 other author(s). IACR Cryptol. ePrint Arch., (2022)Low Memory Attacks on Small Key CSIDH., , , and . ACNS, volume 13906 of Lecture Notes in Computer Science, page 276-304. Springer, (2023)Generic Models for Group Actions., , , , , and . Public Key Cryptography (1), volume 13940 of Lecture Notes in Computer Science, page 406-435. Springer, (2023)Efficient Computation of (2n, 2n)-Isogenies.. IACR Cryptol. ePrint Arch., (2022)Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM., , , , , and . ASIACRYPT (2), volume 13792 of Lecture Notes in Computer Science, page 36-66. Springer, (2022)Efficient computation of (2n,2n)-isogenies.. Des. Codes Cryptogr., 92 (6): 1761-1802 (June 2024)