Author of the publication

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 1006-1018. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Atomic and Fair Data Exchange via Blockchain., , , , , , and . IACR Cryptol. ePrint Arch., (2024)Powers-of-Tau to the People: Decentralizing Setup Ceremonies., , , and . ACNS (3), volume 14585 of Lecture Notes in Computer Science, page 105-134. Springer, (2024)Powers-of-Tau to the People: Decentralizing Setup Ceremonies., , , and . IACR Cryptol. ePrint Arch., (2022)Attribute-Based Encryption for Arithmetic Circuits., , and . IACR Cryptology ePrint Archive, (2013)Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems., , and . IACR Cryptology ePrint Archive, (2019)Privacy-preserving matrix factorization., , , , , and . CCS, page 801-812. ACM, (2013)STROBE: Streaming Threshold Random Beacons., , , , , , , , and . AFT, volume 282 of LIPIcs, page 7:1-7:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures., , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 577-608. Springer, (2021)Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems., , and . AFT, page 189-201. ACM, (2020)Taming the Many EdDSAs., , and . SSR, volume 12529 of Lecture Notes in Computer Science, page 67-90. Springer, (2020)