Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some remarks concerning the complexity of computing class groups of quadratic fields., and . J. Complex., 7 (3): 311-315 (1991)PROPYLA: Privacy Preserving Long-Term Secure Storage., , , and . SCC@AsiaCCS, page 39-48. ACM, (2018)Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2., , , and . AFRICACRYPT, volume 6055 of Lecture Notes in Computer Science, page 69-81. Springer, (2010)On the Efficiency of Provably Secure NTRU., , and . PQCrypto, volume 8772 of Lecture Notes in Computer Science, page 22-39. Springer, (2014)Postquantum Cryptography - State of the Art., , and . IEEE Secur. Priv., 15 (4): 12-13 (2017)Long term confidentiality: a survey., , , and . Des. Codes Cryptogr., 71 (3): 459-478 (2014)Quantum security analysis of a lattice-based oblivious transfer protocol., , , and . Frontiers Inf. Technol. Electron. Eng., 18 (9): 1348-1369 (2017)BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications., , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 484-502. Springer, (2020)Einf�hrung in die Kryptographie (Springer-Lehrbuch). Springer, Berlin, 4., erw. Aufl. edition, (March 2008)Context Hiding Multi-key Linearly Homomorphic Authenticators., , and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 493-513. Springer, (2019)