cryptography conferences Secrets
Andreas’ works range from theoretical functions, like the best way to design quantum assaults or official safety arguments in post-quantum safety models, to utilized operates, much like the analysis of facet-channel assaults or the event of successful hash-based mostly signature strategies. In lots of my operates, Andreas attempts to mix the theo