Author of the publication

How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium.

, and . CANS, volume 14342 of Lecture Notes in Computer Science, page 75-100. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Power of Few Qubits and Collisions - Subset Sum Below Grover's Bound., and . PQCrypto, volume 12100 of Lecture Notes in Computer Science, page 445-460. Springer, (2020)Video Retrieval Using Search and Browsing., , , , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2004)Entropy Suffices for Key Guessing., , and . IACR Cryptol. ePrint Arch., (2023)Quantum Period Finding with a Single Output Qubit - Factoring n-bit RSA with n/2 Qubits., and . CoRR, (2019)Design and Characterization of a Data Converter in a SiC CMOS Technology for Harsh Environment Sensing Applications., , , , , , , and . SENSORS, page 1-4. IEEE, (2023)How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium., and . CANS, volume 14342 of Lecture Notes in Computer Science, page 75-100. Springer, (2023)Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions., , and . IMACC, volume 11929 of Lecture Notes in Computer Science, page 178-199. Springer, (2019)How to Find Ternary LWE Keys Using Locality Sensitive Hashing., and . IMACC, volume 13129 of Lecture Notes in Computer Science, page 247-264. Springer, (2021)How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations., , , , , and . CoRR, (2021)How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium., and . IACR Cryptol. ePrint Arch., (2022)