From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CSI-RAShi: Distributed key generation for CSIDH., , , и . IACR Cryptol. ePrint Arch., (2020)An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2., и . J. Cryptol., 19 (1): 1-25 (2006)Quantum Equivalence of the DLP and CDHP for Group Actions., , , и . CoRR, (2018)BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption., , , , , , , , , и 1 other автор(ы). IACR Cryptol. ePrint Arch., (2022)SoK: On the Security of Cryptographic Problems from Linear Algebra., , , и . IACR Cryptol. ePrint Arch., (2021)On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves., , , и . IACR Cryptol. ePrint Arch., (2022)Fully homomorphic SIMD operations., и . Des. Codes Cryptogr., 71 (1): 57-81 (2014)Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data Handling., , , и . AFRICACRYPT, том 10239 из Lecture Notes in Computer Science, стр. 184-201. (2017)Implementation Attacks & Countermeasures., , , , и . Identity-Based Cryptography, том 2 из Cryptology and Information Security Series, IOS Press, (2009)EPIC: Efficient Private Image Classification (or: Learning from the Masters)., , , и . CT-RSA, том 11405 из Lecture Notes in Computer Science, стр. 473-492. Springer, (2019)