Author of the publication

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 1006-1018. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Powers-of-Tau to the People: Decentralizing Setup Ceremonies., , , and . ACNS (3), volume 14585 of Lecture Notes in Computer Science, page 105-134. Springer, (2024)Atomic and Fair Data Exchange via Blockchain., , , , , , and . IACR Cryptol. ePrint Arch., (2024)Attribute-Based Encryption for Arithmetic Circuits., , and . IACR Cryptology ePrint Archive, (2013)Powers-of-Tau to the People: Decentralizing Setup Ceremonies., , , and . IACR Cryptol. ePrint Arch., (2022)Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems., , and . IACR Cryptology ePrint Archive, (2019)Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures., , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 577-608. Springer, (2021)STROBE: Streaming Threshold Random Beacons., , , , , , , , and . AFT, volume 282 of LIPIcs, page 7:1-7:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)Privacy-preserving matrix factorization., , , , , and . CCS, page 801-812. ACM, (2013)Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems., , and . AFT, page 189-201. ACM, (2020)Taming the Many EdDSAs., , and . SSR, volume 12529 of Lecture Notes in Computer Science, page 67-90. Springer, (2020)