Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Garbling of Circuits Under Standard Assumptions., , , and . ACM Conference on Computer and Communications Security, page 567-578. ACM, (2015)Hardware Implementation of AES Using Area-Optimal Polynomials for Composite-Field Representation GF(2^4)^2 of GF(2^8)., and . ARITH, page 112-117. IEEE Computer Society, (2016)Blinded random corruption attacks., and . HOST, page 85-90. IEEE Computer Society, (2016)On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM., , , and . IACR Cryptol. ePrint Arch., (2020)Fast Software Implementation of Binary Elliptic Curve Cryptography., and . IACR Cryptology ePrint Archive, (2013)Vectorization of ChaCha Stream Cipher., and . IACR Cryptology ePrint Archive, (2013)Software Optimizations for Cryptographic Primitives on General Purpose x86_64 Platforms.. INDOCRYPT, volume 7107 of Lecture Notes in Computer Science, page 399-400. Springer, (2011)Flying in a floating (point) world.. Int. J. Comput. Math. Learn., 4 (2-3): 225-234 (1999)How to Abuse and Fix Authenticated Encryption Without Key Commitment., , , , , and . USENIX Security Symposium, page 3291-3308. USENIX Association, (2022)The Advantage of Truncated Permutations., and . CSCML, volume 11527 of Lecture Notes in Computer Science, page 111-120. Springer, (2019)