From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates., , , , и . IACR Cryptol. ePrint Arch., (2019)Time-independent discrete Gaussian sampling for post-quantum cryptography., , , и . FPT, стр. 241-244. IEEE, (2016)Standard Lattice-Based Key Encapsulation on Embedded Devices., , , и . IACR Cryptology ePrint Archive, (2018)The Return of the SDitH., , , , , и . EUROCRYPT (5), том 14008 из Lecture Notes in Computer Science, стр. 564-596. Springer, (2023)Lightweight Hardware Implementation of R-LWE Lattice-Based Cryptography., , , , и . APCCAS, стр. 403-406. IEEE, (2018)Isochronous Gaussian Sampling: From Inception to Implementation., , , и . PQCrypto, том 12100 из Lecture Notes in Computer Science, стр. 53-71. Springer, (2020)Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography., , , , и . ISCAS, стр. 1-5. IEEE, (2019)Batch Signatures, Revisited., , , , , , , и . CT-RSA, том 14643 из Lecture Notes in Computer Science, стр. 163-186. Springer, (2024)Compact and provably secure lattice-based signatures in hardware., , , и . ISCAS, стр. 1-4. IEEE, (2017)SoK: How (not) to Design and Implement Post-quantum Cryptography., , и . CT-RSA, том 12704 из Lecture Notes in Computer Science, стр. 444-477. Springer, (2021)