Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tighter, faster, simpler side-channel security evaluations beyond computing power., , and . IACR Cryptology ePrint Archive, (2015)Short Generators Without Quantum Computers: The Case of Multiquadratics., , , , and . EUROCRYPT (1), volume 10210 of Lecture Notes in Computer Science, page 27-59. (2017)Reduced memory meet-in-the-middle attack against the NTRU private key.. LMS J. Comput. Math., 19 (A): 43-57 (2016)Rapidly Verifiable XMSS Signatures., , , and . IACR Cryptol. ePrint Arch., (2020)From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium., , , , , , , and . IACR Cryptol. ePrint Arch., (2023)Masking Kyber: First- and Higher-Order Implementations., , , , and . IACR Cryptol. ePrint Arch., (2021)Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks., , , and . IACR Cryptol. ePrint Arch., (2022)Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations., , , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (4): 58-79 (2023)NTRU Prime: Reducing Attack Surface at Low Cost., , , and . SAC, volume 10719 of Lecture Notes in Computer Science, page 235-260. Springer, (2017)Enabling FrodoKEM on Embedded Devices., , , , , and . IACR Cryptol. ePrint Arch., (2023)