Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-independent discrete Gaussian sampling for post-quantum cryptography., , , and . FPT, page 241-244. IEEE, (2016)Standard Lattice-Based Key Encapsulation on Embedded Devices., , , and . IACR Cryptology ePrint Archive, (2018)Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates., , , , and . IACR Cryptol. ePrint Arch., (2019)The Return of the SDitH., , , , , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 564-596. Springer, (2023)Isochronous Gaussian Sampling: From Inception to Implementation., , , and . PQCrypto, volume 12100 of Lecture Notes in Computer Science, page 53-71. Springer, (2020)Lightweight Hardware Implementation of R-LWE Lattice-Based Cryptography., , , , and . APCCAS, page 403-406. IEEE, (2018)Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography., , , , and . ISCAS, page 1-5. IEEE, (2019)Batch Signatures, Revisited., , , , , , , and . CT-RSA, volume 14643 of Lecture Notes in Computer Science, page 163-186. Springer, (2024)GLITCH: A Discrete Gaussian Testing Suite for Lattice-based Cryptography., and . SECRYPT, page 413-419. SciTePress, (2017)BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON Signature Scheme., , , , and . ICETE (2), page 61-71. SciTePress, (2019)