Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
1
Exploring SIDH-Based Signature Parameters:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2024 ,
2
Isogeny Problems with Level Structure:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
3
Supersingular Curves You Can Trust:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
4
M-SIDH and MD-SIDH: Countering SIDH Attacks by Masking Info..:
, In:
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
5
New SIDH Countermeasures for a More Efficient Key Exchange:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2023 ,
6
SCALLOP: Scaling the CSI-FiSh:
, In:
?
Public-Key Cryptography – PKC 2022; Lecture Notes in Computer Science ,
7
On the Isogeny Problem with Torsion Point Information:
, In:
?
Topics in Cryptology – CT-RSA 2022; Lecture Notes in Computer Science ,
8
A New Adaptive Attack on SIDH:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
9
SHealS and HealS: Isogeny-Based PKEs from a Key Validation ..:
, In:
?
Post-Quantum Cryptography; Lecture Notes in Computer Science ,
10
SimS: A Simplification of SiGamal:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
11