Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Generalized First Fall Degree Assumptions., , , and . IACR Cryptology ePrint Archive, (2015)MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems., , , , and . IACR Cryptology ePrint Archive, (2015)A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases., , , , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 374-393. Springer, (2014)Public-Key Cryptography from New Multivariate Quadratic Assumptions., , and . Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 190-205. Springer, (2012)Efficient Implementation of the etaT Pairing on GPU., , , and . IACR Cryptology ePrint Archive, (2011)Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT., , , , , and . NSS, volume 11058 of Lecture Notes in Computer Science, page 484-490. Springer, (2018)Prolongation in spontaneous Mandarin., , , , and . INTERSPEECH, ISCA, (2004)Discovery of prognostic biomarkers for predicting lung cancer metastasis using microarray and survival data., , , , , , , , and . BMC Bioinformatics, (2015)A multivariate quadratic challenge toward post-quantum generation cryptography., , , , and . ACM Comm. Computer Algebra, 49 (3): 105-107 (2015)Improvement of Faugère et al.'s Method to Solve ECDLP., , , and . IWSEC, volume 8231 of Lecture Notes in Computer Science, page 115-132. Springer, (2013)