Author of the publication

A Direct Key Recovery Attack on SIDH.

, , , , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 448-471. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Short Stickelberger Class Relations and Application to Ideal-SVP., , and . EUROCRYPT (1), volume 10210 of Lecture Notes in Computer Science, page 324-348. (2017)Computation of a 30750-Bit Binary Field Discrete Logarithm., , , , and . IACR Cryptol. ePrint Arch., (2020)SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies., , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 64-93. Springer, (2020)Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys., and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 53-68. Springer, (2015)Cryptanalysis of Algebraic Verifiable Delay Functions., , , , , , and . CRYPTO (3), volume 14922 of Lecture Notes in Computer Science, page 457-490. Springer, (2024)A Direct Key Recovery Attack on SIDH., , , , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 448-471. Springer, (2023)Finding orientations of supersingular elliptic curves and quaternion orders., , , , , and . Des. Codes Cryptogr., 92 (11): 3447-3493 (November 2024)Efficient Verifiable Delay Functions.. EUROCRYPT (3), volume 11478 of Lecture Notes in Computer Science, page 379-407. Springer, (2019)Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic., and . IACR Cryptology ePrint Archive, (2019)Supersingular Curves You Can Trust., , , , , , , , , and . IACR Cryptol. ePrint Arch., (2022)