Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correlation Power Analysis on NTRU Prime and Related Countermeasures., , and . IACR Cryptology ePrint Archive, (2019)Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs., , and . IACR Cryptology ePrint Archive, (2017)Implementing 128-bit Secure MPKC Signatures., , , , and . IACR Cryptology ePrint Archive, (2017)Parallelization on Gauss Sieve Algorithm over Ideal Lattice., , , and . J. Inf. Sci. Eng., 37 (5): 1187-1209 (2021)The behavior of Wiener indices and polynomials of graphs under five graph decorations., , and . Appl. Math. Lett., 20 (3): 290-295 (2007)Presorting algorithms: An average-case point of view., , and . Theor. Comput. Sci., 242 (1-2): 29-40 (2000)Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (1): 127-151 (2022)Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (1): 221-244 (2022)Multivariates Polynomials for Hashing., and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 358-371. Springer, (2007)Theoretical Analysis of XL over Small Fields., and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 277-288. Springer, (2004)