Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Evaluation on KpqC Round 1 Lattice-Based Algorithms Using Lattice Estimator., , , , and . ICISC (2), volume 14562 of Lecture Notes in Computer Science, page 261-281. Springer, (2023)Single Trace Attack on Key Reconciliation Process for Quantum Key Distribution., , , and . ICTC, page 209-213. IEEE, (2020)Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves.. IACR Cryptol. ePrint Arch., (2021)Single Trace Side Channel Analysis on Quantum Key Distribution., , , , , and . ICTC, page 736-739. IEEE, (2018)Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves., , , and . ASIACRYPT (2), volume 11922 of Lecture Notes in Computer Science, page 273-292. Springer, (2019)Fault Attack on SQIsign., , , , , , and . PQCrypto (2), volume 14772 of Lecture Notes in Computer Science, page 54-76. Springer, (2024)