Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Macroscopic manifestation of domain-wall magnetism and magnetoelectric effect in a Néel-type skyrmion host, , , , , , , , , and 9 other author(s). npj Quantum Mater., 5 (44): 1-8 (Jul 6, 2020)Impact of compliance with infection management guidelines on outcome in patients with severe sepsis: a prospective observational multi-center study, , , , , , , , , and 13 other author(s). Critical Care, 18 (2): R42 (2014)On Index Calculus Algorithms for Subfield Curves., , , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 115-138. Springer, (2020)On the Isogeny Problem with Torsion Point Information., , , and . Public Key Cryptography (1), volume 13177 of Lecture Notes in Computer Science, page 142-161. Springer, (2022)On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol., , , , and . AFRICACRYPT, volume 12174 of Lecture Notes in Computer Science, page 195-213. Springer, (2020)Failing to Hash Into Supersingular Isogeny Graphs., , , , , , , , , and 5 other author(s). Comput. J., 67 (8): 2702-2719 (2024)Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves., , , , , and . IACR Cryptol. ePrint Arch., (2023)The Request for Record Linkage in the IAB-SOEP Migration Sample, , , and . DIW Berlin, Berlin, (2015)SCALLOP: Scaling the CSI-FiSh., , , , , , and . Public Key Cryptography (1), volume 13940 of Lecture Notes in Computer Science, page 345-375. Springer, (2023)One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols., , , and . EUROCRYPT (1), volume 12696 of Lecture Notes in Computer Science, page 242-271. Springer, (2021)