Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing., , , and . IACR Cryptol. ePrint Arch., (2023)Hardness estimates of the Code Equivalence Problem in the Rank Metric., , and . IACR Cryptol. ePrint Arch., (2022)Don't forget the constant-time in CSURF., and . IACR Cryptol. ePrint Arch., (2021)Effective Pairings in Isogeny-Based Cryptography.. LATINCRYPT, volume 14168 of Lecture Notes in Computer Science, page 109-128. Springer, (2023)On the Practicality of Post-Quantum TLS Using Large-Parameter CSIDH., , , , , , , and . IACR Cryptol. ePrint Arch., (2023)Hardness estimates of the code equivalence problem in the rank metric., , and . Des. Codes Cryptogr., 92 (3): 833-862 (March 2024)Take Your MEDS: Digital Signatures from Matrix Code Equivalence., , , , , , and . AFRICACRYPT, volume 14064 of Lecture Notes in Computer Science, page 28-52. Springer, (2023)Disorientation faults in CSIDH., , , , , , , and . IACR Cryptol. ePrint Arch., (2022)Fully Projective Radical Isogenies in Constant-Time., and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 73-95. Springer, (2022)Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE., , , and . IACR Cryptol. ePrint Arch., (2022)