Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of the Wave Signature Scheme., and . IACR Cryptology ePrint Archive, (2018)DAGS: Reloaded Revisiting Dyadic Key Encapsulation., , , , , , , , , and 3 other author(s). IACR Cryptology ePrint Archive, (2018)On a CCA2-secure variant of McEliece in the standard model.. IACR Cryptology ePrint Archive, (2012)Towards KEM Unification., and . IACR Cryptology ePrint Archive, (2018)DAGS: Key encapsulation using dyadic GS codes., , , , , , , , , and 3 other author(s). J. Mathematical Cryptology, 12 (4): 221-239 (2018)Secure and Anonymous Hybrid Encryption from Coding Theory.. PQCrypto, volume 7932 of Lecture Notes in Computer Science, page 174-187. Springer, (2013)A Note on Non-Interactive Key Exchange from Code Equivalence., , , and . IACR Cryptol. ePrint Arch., (2021)Compact McEliece keys based on quasi-dyadic Srivastava codes.. J. Mathematical Cryptology, 6 (2): 149-169 (2012)Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment.. Cryptography, 2 (4): 30 (2018)Code-Based Key Encapsulation from McEliece's Cryptosystem.. MACIS, volume 10693 of Lecture Notes in Computer Science, page 454-459. Springer, (2017)