Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-independent discrete Gaussian sampling for post-quantum cryptography., , , and . FPT, page 241-244. IEEE, (2016)Lattice-based Key-sharing Schemes: A Survey., , , and . ACM Comput. Surv., 54 (1): 9:1-9:39 (2022)Standard Lattice-Based Key Encapsulation on Embedded Devices., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (3): 372-393 (2018)Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates., , , , and . IACR Cryptol. ePrint Arch., (2019)Batch Signatures, Revisited., , , , , , , and . IACR Cryptol. ePrint Arch., (2023)The Return of the SDitH., , , , , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 564-596. Springer, (2023)GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography., and . IACR Cryptology ePrint Archive, (2017)Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography., , , , and . ISCAS, page 1-5. IEEE, (2018)BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON Signature Scheme., , , , and . ICETE (2), page 61-71. SciTePress, (2019)Towards Automating Cryptographic Hardware Implementations: A Case Study of HQC., , , , , , , and . CBCrypto, volume 13839 of Lecture Notes in Computer Science, page 62-76. Springer, (2022)