| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
IACR Commun. Cryptol.
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2023 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | — | conf |
EUROCRYPT (1)
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
LightSec
|
| 2013 | — | — |
|
| 2013 | C | conf |
PQCrypto
|
| 2012 | B | conf |
CANS
|
| 2012 | C | conf |
ISC
|
| 2011 | J | jnl |
J. Cryptogr. Eng.
|
| 2011 | A | conf |
AsiaCCS
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
J. Cryptogr. Eng.
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | C | conf |
WISTP
|
| 2010 | C | conf |
PQCrypto
|
| 2010 | J | jnl |
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices.
IACR Cryptol. ePrint Arch.
|
| 2010 | C | conf |
ICICS
|
| 2009 | — | conf |
ASAP
|
| 2009 | Misc | conf |
ICISC
|
| 2008 | C | conf |
PQCrypto
|