Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polynomial Time Cryptanalytic Extraction of Neural Network Models., , , , , and . IACR Cryptol. ePrint Arch., (2023)Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields., , , , , , and . IACR Cryptology ePrint Archive, (2016)Smoothness Test for Polynomials Defined Over Small Characteristic Finite Fields., , , and . Math. Comput. Sci., 12 (3): 319-337 (2018)Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields., , , , , , and . Adv. in Math. of Comm., 12 (4): 741-759 (2018)PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs., , , , , , and . IACR Cryptol. ePrint Arch., (2024)SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography., , and . IACR Cryptol. ePrint Arch., (2024)Walsh Spectrum Analysis on Sampling Distributions., , , , , , , , , and 5 other author(s). (June 2018)Multivariate Correlation Attacks and the Cryptanalysis of LFSR-based Stream Ciphers., and . IACR Cryptol. ePrint Arch., (2023)