Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3., , , , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 317-337. Springer, (2016)Transcript Secure Signatures Based on Modular Lattices., , , , and . PQCrypto, volume 8772 of Lecture Notes in Computer Science, page 142-159. Springer, (2014)NTRU modular lattice signature scheme on CUDA GPUs., , , , and . HPCS, page 501-508. IEEE, (2016)Estimating Quantum Speedups for Lattice Sieves., , , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 583-613. Springer, (2020)Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE., and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 32-61. Springer, (2019)Improving post-quantum cryptography through cryptanalysis.. University of Waterloo, Ontario, Canada, (2020)base-search.net (ftunivwaterloo:oai:uwspace.uwaterloo.ca:10012/16060).Decryption Failure Is More Likely After Success., and . PQCrypto, volume 12100 of Lecture Notes in Computer Science, page 206-225. Springer, (2020)Choosing Parameters for NTRUEncrypt., , , , , and . CT-RSA, volume 10159 of Lecture Notes in Computer Science, page 3-18. Springer, (2017)Practical Signatures from the Partial Fourier Recovery Problem., , , , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 476-493. Springer, (2014)A quantum-safe circuit-extension handshake for Tor., , and . IACR Cryptology ePrint Archive, (2015)