Personensuche
X
?
Advances in Cryptology – ASIACRYPT 2022; Lecture Notes in Computer Science ,
1
Compact FE for Unbounded Attribute-Weighted Sums for Logspa..:
, In:
?
Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing ,
2
Implementation Report of the Kohel–Lauter–Petit–Tignol Algo..:
, In:
?
Information Security and Cryptology – ICISC 2020; Lecture Notes in Computer Science ,
4
An Efficient Authenticated Key Exchange from Random Self-re..:
, In:
?
Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography ,
7
Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Find..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
11
Group Key Exchange from CSIDH and Its Application to Truste..:
, In:
?
International Symposium on Mathematics, Quantum Theory, and Cryptography; Mathematics for Industry ,
12
Post-Quantum Constant-Round Group Key Exchange from Static ..:
, In:
?
Provable Security; Lecture Notes in Computer Science ,
13
One-Round Authenticated Group Key Exchange from Isogenies:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2018 ,
14
Supersingular Isogeny Diffie–Hellman Authenticated Key Exch..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2018 ,
15