Author of the publication

Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory.

, , , and . ASIACRYPT (3), volume 14440 of Lecture Notes in Computer Science, page 3-33. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Embedded Built-In-Test Detection Circuit for Radio Frequency Systems and Circuits., and . DDECS, page 89-90. IEEE Computer Society, (2006)How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers., , , , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 455-483. (2016)A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT., and . IACR Cryptology ePrint Archive, (2016)A distinguisher on PRESENT-like permutations with application to SPONGENT., and . Sci. China Inf. Sci., 60 (7): 72101 (2017)A Secure Threshold Signature Scheme from Lattices., , and . CIS, page 469-473. IEEE Computer Society, (2013)An Attribute-Based Encryption Scheme Secure against Malicious KGC., , and . TrustCom, page 1376-1380. IEEE Computer Society, (2012)A Certificateless Signature and Group Signature Schemes against Malicious PKG., and . AINA, page 334-341. IEEE Computer Society, (2008)Optimal energy consumption for dynamic network coding in cooperative multicast system., , and . ICT, page 1-5. IEEE, (2013)On the capacity outage probability for cooperative networking coding system with mulitple relays., , , and . IC-NIDC, page 558-561. IEEE, (2012)A Generic Construction for Proxy Cryptography.. CSEE (1), volume 214 of Communications in Computer and Information Science, page 284-289. Springer, (2011)