Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding Problem., , , and . CoRR, (2022)Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone., , , , and . FPS, volume 13877 of Lecture Notes in Computer Science, page 54-70. Springer, (2022)A model driven system to support optimal collaborative processes design in crisis management., , and . ISCRAM, ISCRAM Association, (2014)A gapless code-based hash proof system based on RQC and its applications., , , , and . Des. Codes Cryptogr., 90 (12): 3011-3044 (2022)Preventing Timing Attacks Against RQC Using Constant Time Decoding of Gabidulin Codes., , , and . PQCrypto, volume 11505 of Lecture Notes in Computer Science, page 371-386. Springer, (2019)Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone., , , , and . CoRR, (2022)The Rank-Based Cryptography Library., , , , , , and . CBCrypto, volume 13150 of Lecture Notes in Computer Science, page 22-41. Springer, (2021)Enabling PERK on Resource-Constrained Devices., , , , and . IACR Cryptol. ePrint Arch., (2024)Quasi-Cyclic Stern Proof of Knowledge., , , and . ISIT, page 1459-1464. IEEE, (2022)RQC Revisited and More Cryptanalysis for Rank-Based Cryptography., , , and . IEEE Trans. Inf. Theory, 70 (3): 2271-2286 (2024)