Search for persons
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
2
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group ..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
3
Side-Channel Attacks on Query-Based Data Anonymization:
, In:
?
Progress in Cryptology – LATINCRYPT 2021; Lecture Notes in Computer Science ,
4
On Forging SPHINCS$$^{+}$$-Haraka Signatures on a Fault-Tol..:
, In:
?
Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography ,
5
Exploiting Decryption Failures in Mersenne Number Cryptosys..:
, In:
?
Proceedings of ACM Workshop on Theory of Implementation Security Workshop ,
6
Timing Attacks on Error Correcting Codes in Post-Quantum Sc..:
, In:
?
Progress in Cryptology – LATINCRYPT 2019; Lecture Notes in Computer Science ,
7