From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3., , , , , и . SAC, том 10532 из Lecture Notes in Computer Science, стр. 317-337. Springer, (2016)Clubcards for the WebPKI: Smaller Certificate Revocation Tests in Theory and Practice.. SP, стр. 652-663. IEEE, (2025)Transcript Secure Signatures Based on Modular Lattices., , , , и . PQCrypto, том 8772 из Lecture Notes in Computer Science, стр. 142-159. Springer, (2014)NTRU modular lattice signature scheme on CUDA GPUs., , , , и . HPCS, стр. 501-508. IEEE, (2016)Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE., и . CRYPTO (1), том 11692 из Lecture Notes in Computer Science, стр. 32-61. Springer, (2019)Estimating Quantum Speedups for Lattice Sieves., , , и . ASIACRYPT (2), том 12492 из Lecture Notes in Computer Science, стр. 583-613. Springer, (2020)Improving post-quantum cryptography through cryptanalysis.. University of Waterloo, Ontario, Canada, (2020)base-search.net (ftunivwaterloo:oai:uwspace.uwaterloo.ca:10012/16060).Decryption Failure Is More Likely After Success., и . PQCrypto, том 12100 из Lecture Notes in Computer Science, стр. 206-225. Springer, (2020)A quantum-safe circuit-extension handshake for Tor., , и . IACR Cryptology ePrint Archive, (2015)DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report., , , , , и . IACR Cryptology ePrint Archive, (2015)