Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decoding Square-Free Goppa Codes Over $\BBF_p$., , and . IEEE Trans. Information Theory, 59 (10): 6851-6858 (2013)Scaling efficient code-based cryptosystems for embedded platforms, , , and . CoRR, (2012)Monoidic Codes in Cryptography., , and . PQCrypto, volume 7071 of Lecture Notes in Computer Science, page 179-199. Springer, (2011)One-time signature scheme from syndrome decoding over generic error-correcting codes., , and . Journal of Systems and Software, 84 (2): 198-204 (2011)Scaling efficient code-based cryptosystems for embedded platforms., , , and . J. Cryptographic Engineering, 4 (2): 123-134 (2014)Subgroup security in pairing-based cryptography., , , , , and . IACR Cryptology ePrint Archive, (2015)Intelligent IoT Motes: Preventing Their Abuse at the Weakest Entry Point., , and . IEEE Design & Test, 36 (2): 73-80 (2019)MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes., , , and . ISIT, page 2069-2073. IEEE, (2013)Toward Postquantum Security for Embedded Cores., , , , , and . IEEE Micro, 39 (4): 17-26 (2019)Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes., , and . IACR Cryptology ePrint Archive, (2019)