Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange., , and . CRYPTO, volume 3152 of Lecture Notes in Computer Science, page 477-493. Springer, (2004)Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification.. IACR Cryptology ePrint Archive, (2020)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Faster Complete Formulas for the GLS254 Binary Curve.. IACR Cryptol. ePrint Arch., (2023)BAT: Small and Fast KEM over NTRU Lattices., , , and . IACR Cryptol. ePrint Arch., (2022)Transparent Harddisk Encryption.. CHES, volume 2162 of Lecture Notes in Computer Science, page 273-285. Springer, (2001)Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication., , and . J. Cryptol., 20 (1): 115-149 (2007)Optimizing MAKWA on GPU and CPU.. IACR Cryptology ePrint Archive, (2015)Did Filiol Break AES ?, , , , and . IACR Cryptology ePrint Archive, (2003)Digital Signatures Do Not Guarantee Exclusive Ownership., and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 138-150. (2005)