Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FHEW with Efficient Multibit Bootstrapping., and . LATINCRYPT, volume 9230 of Lecture Notes in Computer Science, page 119-135. Springer, (2015)LESS-FM: Fine-Tuning Signatures from the Code Equivalence Problem., , , and . PQCrypto, volume 12841 of Lecture Notes in Computer Science, page 23-43. Springer, (2021)Trace-Σ: a privacy-preserving contact tracing app., , , , , , , and . IACR Cryptol. ePrint Arch., (2020)Advanced signature functionalities from the code equivalence problem., , , , and . Int. J. Comput. Math. Comput. Syst. Theory, 7 (2): 112-128 (2022)A Note on the Security of CSIDH., , and . INDOCRYPT, volume 11356 of Lecture Notes in Computer Science, page 153-168. Springer, (2018)Practical Improvements to Class Group and Regulator Computation of Real Quadratic Fields., and . ANTS, volume 6197 of Lecture Notes in Computer Science, page 50-65. Springer, (2010)Security Estimates for Quadratic Field Based Cryptosystems., , and . ACISP, volume 6168 of Lecture Notes in Computer Science, page 233-247. Springer, (2010)Approximate Short Vectors in Ideal Lattices of Q(ζpe) with Precomputation of Cl(OK).. SAC, volume 10719 of Lecture Notes in Computer Science, page 374-393. Springer, (2017)Fast heuristic algorithms for computing relations in the class group of a quadratic order, with applications to isogeny evaluation., , and . LMS J. Comput. Math., 19 (A): 371-390 (2016)A fast algorithm for finding a short generator of a principal ideal of ℚ(ζ2n).. CoRR, (2015)