Personensuche
X
?
Post-Quantum Cryptography; Lecture Notes in Computer Science ,
1
Properties of Lattice Isomorphism as a Cryptographic Group ..:
, In:
?
Lecture Notes in Networks and Systems; Smart Trends in Computing and Communications ,
3
Implementing "DevSecOps as a Culture"—The Concept, Benefits..:
, In:
?
2022 IEEE International Symposium on Information Theory (ISIT) ,
5
Quasi-Cyclic Stern Proof of Knowledge:
, In:
?
Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science ,
8
New Techniques for Zero-Knowledge: Leveraging Inefficient P..:
, In:
?
Association for Women in Mathematics Series; Research in Mathematics and Public Policy ,
10
Security of NewHope Under Partial Key Exposure:
, In:
?
Public-Key Cryptography – PKC 2019; Lecture Notes in Computer Science ,
11
Upper and Lower Bounds for Continuous Non-Malleable Codes:
, In:
?
Advances in Cryptology – EUROCRYPT 2019; Lecture Notes in Computer Science ,
13
Non-Malleable Codes Against Bounded Polynomial Time Tamperi..:
, In:
?
Proceedings of the 2016 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software ,
14