From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Measuring small subgroup attacks against Diffie-Hellman., , , , , , , и . IACR Cryptology ePrint Archive, (2016)Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field., , и . IACR Cryptol. ePrint Arch., (2021)Family of embedded curves for BLS.. IACR Cryptol. ePrint Arch., (2023)In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild., , , и . EuroS&P, стр. 384-398. IEEE, (2018)Breaking the decisional Diffie-Hellman problem in totally non-maximal imaginary quadratic orders.. IACR Cryptol. ePrint Arch., (2024)Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗.. IACR Cryptology ePrint Archive, (2014)Measuring small subgroup attacks against Diffie-Hellman., , , , , , , и . NDSS, The Internet Society, (2017)Verifiable Delay Functions from Supersingular Isogenies and Pairings., , , и . ASIACRYPT (1), том 11921 из Lecture Notes in Computer Science, стр. 248-277. Springer, (2019)A note on the low order assumption in class group of an imaginary quadratic number fields., , , и . IACR Cryptol. ePrint Arch., (2020)A note on key control in CSIDH.. IACR Cryptol. ePrint Arch., (2022)