From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Extending Regev's factoring algorithm to compute discrete logarithms., и . CoRR, (2023)Concrete Security from Worst-Case to Average-Case Lattice Reductions.. AFRICACRYPT, том 14064 из Lecture Notes in Computer Science, стр. 344-369. Springer, (2023)NTWE: A Natural Combination of NTRU and LWE.. PQCrypto, том 14154 из Lecture Notes in Computer Science, стр. 321-353. Springer, (2023)A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography., и . CoRR, (2024)Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste., , , и . APKC@AsiaCCS, стр. 10-20. ACM, (2023)Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber., , , и . ACNS Workshops, том 13907 из Lecture Notes in Computer Science, стр. 159-177. Springer, (2023)Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?, , , и . IACR Cryptol. ePrint Arch., (2023)Extending Regev's Factoring Algorithm to Compute Discrete Logarithms., и . PQCrypto (2), том 14772 из Lecture Notes in Computer Science, стр. 211-242. Springer, (2024)