Cryptography and Surf
Cryptography and Surf
Home
Work Experience
PC Member
Events
Publications
Talks
Contact
Latest
Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields
Multi-Armed SPHINCS+
Breaking DPA-protected Kyber via the pair-pointwise multiplication
Disorientation faults in CSIDH
Efficient supersingularity testing over F_p and CSIDH key validation
On recovering block cipher secret keys in the cold boot attack setting
DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning
Wavelet: Code-based postquantum signatures with fast verification on microcontrollers
CTIDH: faster constant-time CSIDH
Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
Concrete quantum cryptanalysis of binary elliptic curves
Practical and Provably Secure Distributed Aggregation Verifiable Additive Homomorphic Secret Sharing
Selected constructive and destructive approaches to post-quantum cryptography
A Reaction Attack against Cryptosystems based on LRPC Codes
Don't Forget Your Roots Constant-Time Root Finding over $\mathbb{F}_{2^m}$
DAGS: Reloaded Revisiting Dyadic Key Encapsulation
DAGS: Key Encapsulation using Dyadic GS Codes
Designing Efficient Dyadic Operations for Cryptographic Applications
A new class of irreducible pentanomials for polynomial-based multipliers in binary fields
DAGS: Key Encapsulation using Dyadic GS Codes
Low-communication parallel quantum multi-target preimage search
Cite
×