Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Macroscopic manifestation of domain-wall magnetism and magnetoelectric effect in a Néel-type skyrmion host, , , , , , , , , and 9 other author(s). npj Quantum Mater., 5 (44): 1-8 (Jul 6, 2020)Impact of compliance with infection management guidelines on outcome in patients with severe sepsis: a prospective observational multi-center study, , , , , , , , , and 13 other author(s). Critical Care, 18 (2): R42 (2014)Another look at some isogeny hardness assumptions., , and . IACR Cryptol. ePrint Arch., (2019)On Index Calculus Algorithms for Subfield Curves., , , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 115-138. Springer, (2020)On the (non) obfuscating power of Garside Normal Forms., and . IACR Cryptol. ePrint Arch., (2018)On the Isogeny Problem with Torsion Point Information., , , and . Public Key Cryptography (1), volume 13177 of Lecture Notes in Computer Science, page 142-161. Springer, (2022)On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol., , , , and . AFRICACRYPT, volume 12174 of Lecture Notes in Computer Science, page 195-213. Springer, (2020)Failing to hash into supersingular isogeny graphs., , , , , , , , , and 5 other author(s). IACR Cryptol. ePrint Arch., (2022)Weak Instances of Class Group Action Based Cryptography via Self-pairings., , , , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 762-792. Springer, (2023)Another Look at Some Isogeny Hardness Assumptions., , and . CT-RSA, volume 12006 of Lecture Notes in Computer Science, page 496-511. Springer, (2020)