Naehrig, Michael
54  Ergebnisse:
Personensuche X
?
1

Cryptographic Smooth Neighbors:

, In: Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science,
 
?
2

Sieving for Twin Smooth Integers with Solutions to the Prou..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2021,
 
?
3

Improved Classical Cryptanalysis of SIKE in Practice:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2020,
Costello, Craig ; Longa, Patrick ; Naehrig, Michael.. - p. 505-534 , 2020
 
?
4

Implementing Grover Oracles for Quantum Key Search on AES a..:

, In: Advances in Cryptology – EUROCRYPT 2020; Lecture Notes in Computer Science,
 
?
5

Improved Quantum Circuits for Elliptic Curve Discrete Logar..:

, In: Post-Quantum Cryptography; Lecture Notes in Computer Science,
Häner, Thomas ; Jaques, Samuel ; Naehrig, Michael.. - p. 425-444 , 2020
 
?
6

Dual Isogenies and Their Application to Public-Key Compress..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2019,
Naehrig, Michael ; Renes, Joost - p. 243-272 , 2019
 
?
7

Frodo : Take off the Ring! Practical, Quantum-Secure Key..:

, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
Bos, Joppe ; Costello, Craig ; Ducas, Leo... - p. 1006-1018 , 2016
 
?
9

Privately Evaluating Decision Trees and Random Forests:

Wu, David J. ; Feng, Tony ; Naehrig, Michael.
Proceedings on Privacy Enhancing Technologies.  2016 (2016)  4 - p. 335-355 , 2016
 
?
10

Selecting elliptic curves for cryptography: an efficiency a..:

Bos, Joppe W. ; Costello, Craig ; Longa, Patrick.
Journal of Cryptographic Engineering.  6 (2015)  4 - p. 259-286 , 2015
 
?
11

Private predictive analysis on encrypted medical data:

Bos, Joppe W. ; Lauter, Kristin ; Naehrig, Michael
Journal of Biomedical Informatics.  50 (2014)  - p. 234-243 , 2014
 
?
13

Faster computation of the Tate pairing:

Arène, Christophe ; Lange, Tanja ; Naehrig, Michael.
Journal of Number Theory.  131 (2011)  5 - p. 842-857 , 2011
 
?
14

Can homomorphic encryption be practical?:

, In: Proceedings of the 3rd ACM workshop on Cloud computing security workshop,
 
1-15