Author of the publication

Analysis of Error Terms of Signatures Based on Learning with Errors.

, , , , , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 75-97. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The square root Diffie-Hellman problem., and . Des. Codes Cryptogr., 62 (2): 179-187 (2012)Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers., , , , and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 132-159. Springer, (2014)On the bit security of the weak Diffie-Hellman problem., and . Inf. Process. Lett., 110 (18-19): 799-802 (2010)Winternitz Signature Scheme Using Nonadjacent Forms., , and . Secur. Commun. Networks, (2018)Converting random bits into random numbers., , and . J. Supercomput., 70 (1): 236-246 (2014)Validity of Differential Characteristics of ARX Block Ciphers.. IEEE Access, (2023)Revised Version of Block Cipher CHAM., , , , , , and . ICISC, volume 11975 of Lecture Notes in Computer Science, page 1-19. Springer, (2019)Applying the Simple Partial Discard Method to Crystals-Kyber., and . IEEE Access, (2024)Analysis of Error Terms of Signatures Based on Learning with Errors., , , , , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 75-97. (2016)The l-th power Diffie-Hellman problem and the l-th root Diffie-Hellman problem., , and . Appl. Algebra Eng. Commun. Comput., 29 (1): 41-57 (2018)