Author of the publication

Tight Bounds for Simon's Algorithm.

. LATINCRYPT, volume 12912 of Lecture Notes in Computer Science, page 3-23. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hidden Shift Quantum Cryptanalysis and Implications., and . ASIACRYPT (1), volume 11272 of Lecture Notes in Computer Science, page 560-592. Springer, (2018)On Quantum Slide Attacks., , and . SAC, volume 11959 of Lecture Notes in Computer Science, page 492-519. Springer, (2019)Tight Bounds for Simon's Algorithm.. IACR Cryptol. ePrint Arch., (2020)Single-Query Quantum Hidden Shift Attacks., and . IACR Trans. Symmetric Cryptol., 2024 (3): 266-297 (2024)Quantum Security Analysis of CSIDH., and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 493-522. Springer, (2020)Quantum Key-Recovery on Full AEZ.. SAC, volume 10719 of Lecture Notes in Computer Science, page 394-406. Springer, (2017)Tight Bounds for Simon's Algorithm.. LATINCRYPT, volume 12912 of Lecture Notes in Computer Science, page 3-23. Springer, (2021)Improving Generic Attacks Using Exceptional Functions., , , and . CRYPTO (4), volume 14923 of Lecture Notes in Computer Science, page 105-138. Springer, (2024)QCB: Efficient Quantum-Secure Authenticated Encryption., , , , , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 668-698. Springer, (2021)Improved Classical and Quantum Algorithms for Subset-Sum., , , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 633-666. Springer, (2020)