From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SoK: How (not) to Design and Implement Post-quantum Cryptography., , и . CT-RSA, том 12704 из Lecture Notes in Computer Science, стр. 444-477. Springer, (2021)POPE: Partial Order-Preserving Encoding., , , и . IACR Cryptology ePrint Archive, (2015)POPE: Partial Order Preserving Encoding., , , и . ACM Conference on Computer and Communications Security, стр. 1131-1142. ACM, (2016)Cryptanalysis of LEDAcrypt., , , и . CRYPTO (3), том 12172 из Lecture Notes in Computer Science, стр. 389-418. Springer, (2020)Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13., , , и . ICALP, том 80 из LIPIcs, стр. 38:1-38:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Parallel search for Ramsey grid colorings., и . ACM Southeast Regional Conference, стр. 274-279. ACM, (2012)Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model., , , , и . ASIACRYPT (4), том 13794 из Lecture Notes in Computer Science, стр. 353-383. Springer, (2022)When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer., , , , , , , , , и 1 other автор(ы). CCS, стр. 979-993. ACM, (2022)Constant-Round Group Key Exchange from the Ring-LWE Assumption., , , и . PQCrypto, том 11505 из Lecture Notes in Computer Science, стр. 189-205. Springer, (2019)5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs., , , , , , , , , и . CCS, стр. 981-992. ACM, (2016)