Author:
Fouotsa Tako Boris,Petit Christophe
Publisher
Springer International Publishing
Reference37 articles.
1. Lecture Notes in Computer Science;R Azarderakhsh,2018
2. Basso, A., Kutas, P., Merz, S.P., Petit, C., Sanso, A.: Cryptanalysis of an oblivious PRF from supersingular isogenies. Cryptology ePrint Archive, Report 2021/706, 2021. https://ia.cr/2021/706
3. Lecture Notes in Computer Science;JF Biasse,2014
4. Cervantes-Vázquez, D., Ochoa-Jiménez, E., Rodríguez-Henríquez, F.: eSIDH: the revenge of the SIDH. Cryptology ePrint Archive, Report 2020/021 (2020). https://ia.cr/2020/021
5. Charles, D.X., Lauter, K.E., Goren, E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93–113 (2009)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献