From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A model driven system to support optimal collaborative processes design in crisis management., , и . ISCRAM, ISCRAM Association, (2014)Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone., , , , и . FPS, том 13877 из Lecture Notes in Computer Science, стр. 54-70. Springer, (2022)Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding Problem., , , и . CoRR, (2022)A gapless code-based hash proof system based on RQC and its applications., , , , и . Des. Codes Cryptogr., 90 (12): 3011-3044 (2022)Quasi-Cyclic Stern Proof of Knowledge., , , и . ISIT, стр. 1459-1464. IEEE, (2022)Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone., , , , и . CoRR, (2022)Enabling PERK on Resource-Constrained Devices., , , , и . IACR Cryptol. ePrint Arch., (2024)Preventing Timing Attacks Against RQC Using Constant Time Decoding of Gabidulin Codes., , , и . PQCrypto, том 11505 из Lecture Notes in Computer Science, стр. 371-386. Springer, (2019)The Rank-Based Cryptography Library., , , , , , и . CBCrypto, том 13150 из Lecture Notes in Computer Science, стр. 22-41. Springer, (2021)A practicable timing attack against HQC and its countermeasure., , , , и . Adv. Math. Commun., 16 (3): 621-642 (2022)