From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions., , , и . IACR Cryptology ePrint Archive, (2013)Algebraic Attacks on the Courtois Toy Cipher.. Cryptologia, 32 (3): 220-276 (2008)Algebraic Precomputations in Differential and Integral Cryptanalysis., , , , и . Inscrypt, том 6584 из Lecture Notes in Computer Science, стр. 387-403. Springer, (2010)Notes on GGH13 Without the Presence of Ideals., , и . IMACC, том 10655 из Lecture Notes in Computer Science, стр. 135-158. Springer, (2017)Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable., , , , и . IACR Cryptol. ePrint Arch., (2022)Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE., , , и . IACR Cryptol. ePrint Arch., (2023)Variational quantum solutions to the Shortest Vector Problem., , , и . IACR Cryptol. ePrint Arch., (2022)SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions., , , и . IACR Cryptol. ePrint Arch., (2023)Caveat Implementor! Key Recovery Attacks on MEGA., , , и . EUROCRYPT (5), том 14008 из Lecture Notes in Computer Science, стр. 190-218. Springer, (2023)Plaintext Recovery Attacks against SSH., , и . SP, стр. 16-26. IEEE Computer Society, (2009)