Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Never Trust a Bunny., and . RFIDSec, volume 7739 of Lecture Notes in Computer Science, page 137-148. Springer, (2012)Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups., , and . Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, page 104-118. Springer, (2007)Faster 2-Regular Information-Set Decoding., , , and . IWCC, volume 6639 of Lecture Notes in Computer Science, page 81-98. Springer, (2011)Attacking and Defending the McEliece Cryptosystem., , and . PQCrypto, volume 5299 of Lecture Notes in Computer Science, page 31-46. Springer, (2008)Inverted Edwards Coordinates., and . AAECC, volume 4851 of Lecture Notes in Computer Science, page 20-27. Springer, (2007)Factoring polynomials over arbitrary finite fields., and . Theor. Comput. Sci., 234 (1-2): 301-308 (2000)On the Correct Use of the Negation Map in the Pollard rho Method., , and . Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, page 128-146. Springer, (2011)Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild., , , , , , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 341-360. Springer, (2013)Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies., , , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 409-441. Springer, (2019)Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms., , , and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 388-400. Springer, (2003)