Author of the publication

Exploring SIDH-Based Signature Parameters.

, , , , , , and . ACNS (1), volume 14583 of Lecture Notes in Computer Science, page 432-456. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing explicit isomorphisms with full matrix algebras over $F_q(x)$., , and . CoRR, (2015)Computing Explicit Isomorphisms with Full Matrix Algebras over Fq(x)., , and . Found. Comput. Math., 18 (2): 381-397 (2018)Séta: Supersingular Encryption from Torsion Attacks., , , , , , , and . ASIACRYPT (4), volume 13093 of Lecture Notes in Computer Science, page 249-278. Springer, (2021)Torsion point attacks on "SIDH-like" cryptosystems., and . IACR Cryptol. ePrint Arch., (2022)On the Isogeny Problem with Torsion Point Information., , , and . Public Key Cryptography (1), volume 13177 of Lecture Notes in Computer Science, page 142-161. Springer, (2022)On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol., , , , and . AFRICACRYPT, volume 12174 of Lecture Notes in Computer Science, page 195-213. Springer, (2020)Splitting quaternion algebras over quadratic number fields.. CoRR, (2016)Trapdoor DDH groups from pairings and isogenies., , and . IACR Cryptol. ePrint Arch., (2019)Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves., , , , , and . IACR Cryptol. ePrint Arch., (2023)SCALLOP: Scaling the CSI-FiSh., , , , , , and . Public Key Cryptography (1), volume 13940 of Lecture Notes in Computer Science, page 345-375. Springer, (2023)