Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Torsion point attacks on 'SIDH-like' cryptosystems., and . IET Inf. Secur., 17 (2): 161-170 (March 2023)Proving knowledge of isogenies - A survey., , , and . IACR Cryptol. ePrint Arch., (2023)Secure Oblivious Transfer from Semi-Commutative Masking., , , and . IACR Cryptol. ePrint Arch., (2018)Failing to hash into supersingular isogeny graphs., , , , , , , , , and 5 other author(s). IACR Cryptol. ePrint Arch., (2022)Weak instances of SIDH variants under improved torsion-point attacks., , , , and . IACR Cryptol. ePrint Arch., (2020)Trapdoor DDH Groups from Pairings and Isogenies., , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 431-450. Springer, (2020)SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies., , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 64-93. Springer, (2020)A New Adaptive Attack on SIDH., and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 322-344. Springer, (2022)Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT., , , and . CANS, volume 12579 of Lecture Notes in Computer Science, page 235-258. Springer, (2020)Another Look at Some Isogeny Hardness Assumptions., , and . CT-RSA, volume 12006 of Lecture Notes in Computer Science, page 496-511. Springer, (2020)