Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Lattice-Based Encryption: Stretching Spring., , , and . PQCrypto, volume 10346 of Lecture Notes in Computer Science, page 125-142. Springer, (2017)A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over F2., , and . SOSA, page 285-296. SIAM, (2022)Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions., , and . IMACC, volume 11929 of Lecture Notes in Computer Science, page 178-199. Springer, (2019)Linear algebra algorithms for cryptography. (Algorithmes d'algèbre linéaire pour la cryptographie).. University of Rennes 1, France, (2018)Sparse Gaussian Elimination Modulo p: An Update., and . CASC, volume 9890 of Lecture Notes in Computer Science, page 101-116. Springer, (2016)Malware Detection in PDF Files using Machine Learning., , , and . ICETE (2), page 578-585. SciTePress, (2018)LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS., , , , and . ASIACRYPT (1), volume 11272 of Lecture Notes in Computer Science, page 494-524. Springer, (2018)Computational records with aging hardware: Controlling half the output of SHA-256., , , and . Parallel Comput., (2021)