Search for persons
X
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
1
Zero-Knowledge Proofs for SIDH Variants with Masked Degree ..:
, In:
?
Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2023 ,
2
Generating Supersingular Elliptic Curves over $$\mathbb {F}..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
3
Optimal Generic Attack Against Basic Boneh-Boyen Signatures:
, In:
?
Selected Areas in Cryptography; Lecture Notes in Computer Science ,
4
Towards Post-Quantum Key-Updatable Public-Key Encryption vi..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
8
How Not to Create an Isogeny-Based PAKE:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
10
Improved Digital Signatures Based on Elliptic Curve Endomor..:
, In:
?
Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science ,
11
Towards Optimized and Constant-Time CSIDH on Embedded Devic..:
, In:
?
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop ,
13
SoK : The Problem Landscape of SIDH:
, In:
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
14