Author of the publication

Quantum key distribution and cryptography: a survey.

, , , , , , , , , , , , , , , , , , , , , , , and . Classical and Quantum Information Assurance Foundations and Practice, volume 09311 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange., , and . CRYPTO, volume 3152 of Lecture Notes in Computer Science, page 477-493. Springer, (2004)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification.. IACR Cryptology ePrint Archive, (2020)BAT: Small and Fast KEM over NTRU Lattices., , , and . IACR Cryptol. ePrint Arch., (2022)Faster Complete Formulas for the GLS254 Binary Curve.. IACR Cryptol. ePrint Arch., (2023)Transparent Harddisk Encryption.. CHES, volume 2162 of Lecture Notes in Computer Science, page 273-285. Springer, (2001)Did Filiol Break AES ?, , , , and . IACR Cryptology ePrint Archive, (2003)Optimizing MAKWA on GPU and CPU.. IACR Cryptology ePrint Archive, (2015)Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication., , and . J. Cryptol., 20 (1): 115-149 (2007)Digital Signatures Do Not Guarantee Exclusive Ownership., and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 138-150. (2005)