Author of the publication

Practical Signatures from the Partial Fourier Recovery Problem.

, , , , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 476-493. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3., , , , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 317-337. Springer, (2016)An upper bound on the decryption failure rate of static-key NewHope.. IACR Cryptology ePrint Archive, (2020)Practical Signatures from the Partial Fourier Recovery Problem., , , , and . IACR Cryptology ePrint Archive, (2013)NTRU modular lattice signature scheme on CUDA GPUs., , , , and . HPCS, page 501-508. IEEE, (2016)A Comparison of NTRU Variants.. IACR Cryptology ePrint Archive, (2018)Transcript Secure Signatures Based on Modular Lattices., , , , and . PQCrypto, volume 8772 of Lecture Notes in Computer Science, page 142-159. Springer, (2014)CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM., , , , , , , , and . EuroS&P, page 353-367. IEEE, (2018)Choosing Parameters for NTRUEncrypt., , , , , and . IACR Cryptology ePrint Archive, (2015)A quantum-safe circuit-extension handshake for Tor., , and . IACR Cryptology ePrint Archive, (2015)DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report., , , , , and . IACR Cryptology ePrint Archive, (2015)