From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of a code-based full-time signature., , , , , и . Des. Codes Cryptogr., 89 (9): 2097-2112 (2021)On the applicability of the Fujisaki-Okamoto transformation to the BIKE KEM., , , и . Int. J. Comput. Math. Comput. Syst. Theory, 6 (4): 364-374 (2021)Take Your MEDS: Digital Signatures from Matrix Code Equivalence., , , , , , и . AFRICACRYPT, том 14064 из Lecture Notes in Computer Science, стр. 28-52. Springer, (2023)Secure and Anonymous Hybrid Encryption from Coding Theory.. PQCrypto, том 7932 из Lecture Notes in Computer Science, стр. 174-187. Springer, (2013)On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM., , , и . IACR Cryptol. ePrint Arch., (2020)A Note on Non-Interactive Key Exchange from Code Equivalence., , , и . IACR Cryptol. ePrint Arch., (2021)Cryptanalysis of a Code-Based Signature Scheme Based on the Schnorr-Lyubashevsky Framework., , , и . IEEE Commun. Lett., 25 (9): 2829-2833 (2021)Code-Based Public-Key Encryption Resistant to Key Leakage.. CD-ARES Workshops, том 8128 из Lecture Notes in Computer Science, стр. 44-54. Springer, (2013)On the Performance and Security of Multiplication in GF(2N)., , , , , , , , и . Cryptogr., 2 (3): 25 (2018)Cryptanalysis of a code-based signature scheme without trapdoors., , , и . IACR Cryptol. ePrint Arch., (2021)