Author of the publication

Making the BKW Algorithm Practical for LWE.

, , , , and . INDOCRYPT, volume 12578 of Lecture Notes in Computer Science, page 417-439. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quasi-Optimal Permutation Ranking and Applications to PERK., , , and . IACR Cryptol. ePrint Arch., (2024)Improvements on Making BKW Practical for Solving LWE., , , , and . Cryptogr., 5 (4): 31 (2021)Efficient hash maps to 픾2 on BLS curves., and . IACR Cryptology ePrint Archive, (2017)Further Improvements of the Estimation of Key Enumeration with Applications to Solving LWE., and . IACR Cryptol. ePrint Arch., (2023)The Mersenne Low Hamming Combination Search Problem Can Be Reduced to an ILP Problem., and . AFRICACRYPT, volume 11627 of Lecture Notes in Computer Science, page 41-55. Springer, (2019)Don't Use It Twice! Solving Relaxed Linear Code Equivalence Problems., , , , and . IACR Cryptol. ePrint Arch., (2024)A Hybrid Approach for Multimedia Use Verification., , , and . MediaEval, volume 1739 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Efficient hash maps to $G_2$ on BLS curves., and . Appl. Algebra Eng. Commun. Comput., 33 (3): 261-281 (2022)Enabling PERK on Resource-Constrained Devices., , , , and . IACR Cryptol. ePrint Arch., (2024)Lattice Isomorphism as a Group Action and Hard Problems on Quadratic Forms., , and . IACR Cryptol. ePrint Arch., (2023)