Author of the publication

Quantum Security Analysis of CSIDH.

, and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 493-522. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tight Bounds for Simon's Algorithm.. IACR Cryptol. ePrint Arch., (2020)Hidden Shift Quantum Cryptanalysis and Implications., and . ASIACRYPT (1), volume 11272 of Lecture Notes in Computer Science, page 560-592. Springer, (2018)On Quantum Slide Attacks., , and . SAC, volume 11959 of Lecture Notes in Computer Science, page 492-519. Springer, (2019)Quantum Key-Recovery on Full AEZ.. SAC, volume 10719 of Lecture Notes in Computer Science, page 394-406. Springer, (2017)Quantum Security Analysis of CSIDH., and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 493-522. Springer, (2020)Tight Bounds for Simon's Algorithm.. LATINCRYPT, volume 12912 of Lecture Notes in Computer Science, page 3-23. Springer, (2021)Improving Generic Attacks Using Exceptional Functions., , , and . IACR Cryptol. ePrint Arch., (2024)Anomalies and Vector Space Search: Tools for S-Box Analysis., , and . ASIACRYPT (1), volume 11921 of Lecture Notes in Computer Science, page 196-223. Springer, (2019)Quantum Period Finding against Symmetric Primitives in Practice., and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (1): 1-27 (2022)On Boomerang Attacks on Quadratic Feistel Ciphers New results on KATAN and Simon., and . IACR Trans. Symmetric Cryptol., 2023 (3): 101-145 (2023)