Author of the publication

A Cryptographic Application of Weil Descent.

, and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 191-200. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public key signatures in the multi-user setting., , and . Inf. Process. Lett., 83 (5): 263-266 (2002)Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts., , , , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 29-46. Springer, (2017)Flaws in Applying Proof Methodologies to Signature Schemes., , , and . CRYPTO, volume 2442 of Lecture Notes in Computer Science, page 93-110. Springer, (2002)The algorithmic resolution of diophantine equations - a computational cookbook.. London Mathematical Society student texts Cambridge University Press, (1998)Distributing any Elliptic Curve Based Protocol: With an Application to MixNets., and . IACR Cryptology ePrint Archive, (2019)Efficient Constant Round Multi-party Computation Combining BMR and SPDZ., , , and . CRYPTO (2), volume 9216 of Lecture Notes in Computer Science, page 319-338. Springer, (2015)Projective Coordinates Leak., , and . EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, page 257-267. Springer, (2004)Analysis of the Insecurity of ECMQV with Partially Known Nonces., and . ISC, volume 2851 of Lecture Notes in Computer Science, page 240-251. Springer, (2003)Generic Forward-Secure Key Agreement Without Signatures., , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 114-133. Springer, (2017)Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?, and . CT-RSA, volume 9610 of Lecture Notes in Computer Science, page 325-340. Springer, (2016)