Follow
Bor de Kock
Title
Cited by
Cited by
Year
Practical isogeny-based key-exchange with optimal tightness
B Kock, K Gjøsteen, M Veroni
International Conference on Selected Areas in Cryptography, 451-479, 2020
162020
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
C Boyd, GT Davies, B de Kock, K Gellert, T Jager, L Millerjord
142021
Swoosh: Efficient lattice-based non-interactive key exchange
P Gajland, B de Kock, M Quaresma, G Malavolta, P Schwabe
Cryptology ePrint Archive, 2023
7*2023
A Non-Interactive Key Exchange based on Ring-Learning With Errors
B de Kock
62018
Modular design of KEM-based authenticated key exchange
C Boyd, B de Kock, L Millerjord
Australasian Conference on Information Security and Privacy, 553-579, 2023
2023
From Lattice Crypto to Lættis Krypto: Various Approaches to Post-Quantum Key Exchange
BB de Kock
NTNU, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–6