Author of the publication

Lattice Isomorphism as a Group Action and Hard Problems on Quadratic Forms.

, , and . IACR Cryptol. ePrint Arch., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice Isomorphism as a Group Action and Hard Problems on Quadratic Forms., , and . IACR Cryptol. ePrint Arch., (2023)Extending the GLS endomorphism to speed up GHS Weil descent using Magma., , and . IACR Cryptol. ePrint Arch., (2021)Karatsuba-based square-root Vélu's formulas applied to two isogeny-based protocols., , and . J. Cryptogr. Eng., 13 (1): 89-106 (April 2023)The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents., , , and . J. Cryptogr. Eng., 12 (3): 349-368 (2022)Déjà Vu: Side-Channel Analysis of Mozilla's NSS., , , , , , and . CCS, page 1887-1902. ACM, (2020)Optimal strategies for CSIDH., and . Adv. Math. Commun., 16 (2): 383-411 (2022)Low Memory Attacks on Small Key CSIDH., , , and . ACNS, volume 13906 of Lecture Notes in Computer Science, page 276-304. Springer, (2023)A Note on Constructing SIDH-PoK-based Signatures after Castryck-Decru Attack.. IACR Cryptol. ePrint Arch., (2022)On the Practicality of Post-Quantum TLS Using Large-Parameter CSIDH., , , , , , , and . IACR Cryptol. ePrint Arch., (2023)A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks., , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 130-159. Springer, (2021)