Author of the publication

IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.

, , , , and . CRYPTO (3), volume 10993 of Lecture Notes in Computer Science, page 96-125. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Online Approach for DNN Model Caching and Processor Allocation in Edge Computing., , , , , , , and . IWQoS, page 1-10. IEEE, (2022)Information Assurance Evaluation for Network Information Systems., and . CIS, volume 4456 of Lecture Notes in Computer Science, page 869-877. Springer, (2006)Quantum Misuse Attack on Frodo., , and . Entropy, 24 (10): 1418 (2022)Tunnel Construction Site Monitoring and Digital Twin System., , , , , and . ICACT, page 389-394. IEEE, (2024)Using small-scale quantum devices to solve algebraic equations., , , , , and . Quantum Inf. Process., 20 (4): 140 (2021)Combinatorial Constructions of Optimal Quaternary Additive Codes., , , and . CoRR, (2024)Life Cycle Mining Deformation Monitoring and Analysis Using Sentinel-1 and Radarsat-2 InSAR Time Series., , , and . Remote. Sens., 16 (13): 2335 (July 2024)Non-Binary Quantum Synchronizable Codes From Repeated-Root Cyclic Codes., and . IEEE Trans. Inf. Theory, 64 (3): 1461-1470 (2018)Quantum Information Security Protocols and Quantum Coding Theory., and . SNPD (2), page 352-356. IEEE Computer Society, (2007)Improved Key-Recovery Attacks Under Imperfect SCA Oracle for Lattice-Based KEMs., , , and . ProvSec, volume 14217 of Lecture Notes in Computer Science, page 67-82. Springer, (2023)