Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smoothing Codes and Lattices: Systematic Study and New Bounds., , , and . IACR Cryptol. ePrint Arch., (2022)New directions in nearest neighbor searching with applications to lattice sieving., , , and . SODA, page 10-24. SIAM, (2016)Short Stickelberger Class Relations and Application to Ideal-SVP., , and . EUROCRYPT (1), volume 10210 of Lecture Notes in Computer Science, page 324-348. (2017)Shortest Vector from Lattice Sieving: A Few Dimensions for Free.. EUROCRYPT (1), volume 10820 of Lecture Notes in Computer Science, page 125-145. Springer, (2018)Hull Attacks on the Lattice Isomorphism Problem., and . Public Key Cryptography (1), volume 13940 of Lecture Notes in Computer Science, page 177-204. Springer, (2023)On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography., and . EUROCRYPT (3), volume 13277 of Lecture Notes in Computer Science, page 643-673. Springer, (2022)Does the Dual-Sieve Attack on Learning with Errors Even Work?, and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 37-69. Springer, (2023)New directions in nearest neighbor searching with applications to lattice sieving., , , and . IACR Cryptology ePrint Archive, (2015)On the Statistical Leak of the GGH13 Multilinear Map and Some Variants., and . ASIACRYPT (1), volume 11272 of Lecture Notes in Computer Science, page 465-493. Springer, (2018)Anonymity from Asymmetry: New Constructions for Anonymous HIBE.. CT-RSA, volume 5985 of Lecture Notes in Computer Science, page 148-164. Springer, (2010)