Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
1
Breaking DPA-Protected Kyber via the Pair-Pointwise Multipl..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
2
Multi-armed SPHINCS$$^{+}$$:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
3
Disorientation Faults in CSIDH:
, In:
?
Progress in Cryptology – LATINCRYPT 2023; Lecture Notes in Computer Science ,
4
Fast and Frobenius: Rational Isogeny Evaluation over Finite..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
6
Quantum-Resistant Software Update Security on Low-Power Net..:
, In:
?
Lecture Notes in Computer Science; Information Security ,
7
$$\textsf {DEVA}$$: Decentralized, Verifiable Secure Aggreg..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
9
Non-interactive, Secure Verifiable Aggregation for Decentra..:
, In:
?
Progress in Cryptology – LATINCRYPT 2019; Lecture Notes in Computer Science ,
14
Don't Forget Your Roots: Constant-Time Root Finding over $$..:
, In:
?
Code-Based Cryptography; Lecture Notes in Computer Science ,
15