Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum search for scaled hash function preimages., , , , and . Quantum Inf. Process., 20 (5): 180 (2021)Rank-metric Encryption on Arm-Cortex M0: Porting code-based cryptography to lightweight devices., , , , and . APKC@AsiaCCS, page 23-30. ACM, (2019)Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding Problem., , , and . CoRR, (2022)Advances and Challenges of Rank Metric Cryptography Implementations., , , , , and . ICCD, page 325-328. IEEE, (2019)Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code., , , and . EuroS&P, page 687-706. IEEE, (2023)Verifiable Encrypted Redundancy for Mix-Type Remote Electronic Voting., , and . EGOVIS, volume 6866 of Lecture Notes in Computer Science, page 370-385. Springer, (2011)An IND-CCA-Secure Code-Based Encryption Scheme Using Rank Metric., , , , , and . AFRICACRYPT, volume 11627 of Lecture Notes in Computer Science, page 79-96. Springer, (2019)Quantum Search for Scaled Hash Function Preimages., , , , and . IACR Cryptol. ePrint Arch., (2020)Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices., , , , , and . IEEE Access, (2022)Rank-metric Encryption on Arm-Cortex M0., , , , and . IACR Cryptology ePrint Archive, (2019)