Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures., and . ASIACRYPT, volume 7658 of Lecture Notes in Computer Science, page 433-450. Springer, (2012)The Two Faces of Lattices in Cryptology.. Selected Areas in Cryptography, volume 2259 of Lecture Notes in Computer Science, page 313. Springer, (2001)On the Insecurity of a Server-Aided RSA Protocol., and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 21-35. Springer, (2001)Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers., and . EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, page 502-519. Springer, (2012)Simpler Efficient Group Signatures from Lattices., , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 401-426. Springer, (2015)Improved Provable Reduction of NTRU and Hypercubic Lattices., and . PQCrypto (1), volume 14771 of Lecture Notes in Computer Science, page 343-370. Springer, (2024)Finding short lattice vectors within mordell's inequality., and . STOC, page 207-216. ACM, (2008)Solving BDD by Enumeration: An Update., and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 293-309. Springer, (2013)Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3.. EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, page 555-570. Springer, (2004)Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems., , , and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 528-558. Springer, (2016)