Author:
Alzati Alberto,Di Tullio Daniele,Gyawali Manoj,Tortora Alfonso
Subject
Computational Mathematics,Algebra and Number Theory
Reference13 articles.
1. Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen. Post-Quantum Cryptography, Springer-Verlag Berlin Heidelberg, 2009.
2. Ward Beullens. Breaking Rainbow Takes a Weekend on a Laptop, Cryptology ePrint Archive 2022/214, https://eprint.iacr.org/2022/214.
3. Wouter Castryck, Thomas Decru An efficient key recovery attack on SIDH (preliminary version), Cryptology ePrint Archive 2022/975 https://eprint.iacr.org/2022/975.
4. Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes. CSIDH: An Efficient Post-Quantum Commutative Group Action, In: Peyrin T., Galbraith S. (eds) Advances in Cryptology - ASIACRYPT 2018. Lecture Notes in Computer Science, vol 11274. Springer, Cham, 2018.
5. Ciro Ciliberto. An Undergraduate Primer in Algebraic Geometry, Springer-Verlag Berlin Heidelberg, Unitext 129, 2021.