From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quantum Security Analysis of CSIDH., и . EUROCRYPT (2), том 12106 из Lecture Notes in Computer Science, стр. 493-522. Springer, (2020)Quantum Security Analysis of AES., , и . IACR Trans. Symmetric Cryptol., 2019 (2): 55-93 (2019)Quantum Key-Recovery on Full AEZ.. SAC, том 10719 из Lecture Notes in Computer Science, стр. 394-406. Springer, (2017)Tight Bounds for Simon's Algorithm.. LATINCRYPT, том 12912 из Lecture Notes in Computer Science, стр. 3-23. Springer, (2021)Improving Generic Attacks Using Exceptional Functions., , , и . IACR Cryptol. ePrint Arch., (2024)Hidden Shift Quantum Cryptanalysis and Implications., и . ASIACRYPT (1), том 11272 из Lecture Notes in Computer Science, стр. 560-592. Springer, (2018)Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm., , , , и . CoRR, (2020)Improved Low-qubit Hidden Shift Algorithms.. CoRR, (2019)On Quantum Slide Attacks., , и . SAC, том 11959 из Lecture Notes in Computer Science, стр. 492-519. Springer, (2019)Quantum Attacks without Superposition Queries: the Offline Simon Algorithm., , , , и . IACR Cryptology ePrint Archive, (2019)