Author of the publication

On the (non) obfuscating power of Garside Normal Forms.

, and . IACR Cryptology ePrint Archive, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Practical Cryptanalysis of WalnutDSA TM., , , , , and . Public Key Cryptography (1), volume 10769 of Lecture Notes in Computer Science, page 381-406. Springer, (2018)Factoring Products of Braids via Garside Normal Form., and . Public Key Cryptography (2), volume 11443 of Lecture Notes in Computer Science, page 646-678. Springer, (2019)Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting., , , , and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 327-357. Springer, (2016)Efficiency and pseudo-randomness of a variant of Zémor-Tillich hash function., , and . ICECS, page 906-909. IEEE, (2008)SÉTA: Supersingular Encryption from Torsion Attacks., , , and . IACR Cryptology ePrint Archive, (2019)Signature Schemes Based On Supersingular Isogeny Problems., , and . IACR Cryptology ePrint Archive, (2016)New Subexponential Algorithms for Factoring in SL(2, fq)., , , and . IACR Cryptology ePrint Archive, (2011)Secure Oblivious Transfer from Semi-Commutative Masking., , , and . IACR Cryptology ePrint Archive, (2018)Fault Attacks on Public Key Elements: Application to DLP-Based Schemes., , , and . EuroPKI, volume 5057 of Lecture Notes in Computer Science, page 182-195. Springer, (2008)Cayley Hash Functions., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)