Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations., , , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (4): 58-79 (2023)From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium., , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (4): 262-286 (2023)Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers., , , and . CHES, volume 9813 of Lecture Notes in Computer Science, page 301-320. Springer, (2016)CSIDH: An Efficient Post-Quantum Commutative Group Action., , , , and . ASIACRYPT (3), volume 11274 of Lecture Notes in Computer Science, page 395-427. Springer, (2018)Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer., , and . USENIX Security Symposium, page 3683-3697. USENIX Association, (2022)Dilithium for Memory Constrained Devices., , and . AFRICACRYPT, volume 13503 of Lecture Notes in Computer Science, page 217-235. Springer Nature Switzerland, (2022)Computing Isogenies Between Montgomery Curves Using the Action of (0, 0).. PQCrypto, volume 10786 of Lecture Notes in Computer Science, page 229-247. Springer, (2018)Cyber Resilience for Self-Monitoring IoT Devices., , , , and . CSR, page 160-167. IEEE, (2021)Improved Classical Cryptanalysis of SIKE in Practice., , , , and . Public Key Cryptography (2), volume 12111 of Lecture Notes in Computer Science, page 505-534. Springer, (2020)Polynomial Multiplication with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer., , and . IACR Cryptol. ePrint Arch., (2020)