Follow
Michael Meyer
Michael Meyer
Postdoc at University of Regensburg
Verified email at random-oracles.org - Homepage
Title
Cited by
Cited by
Year
A faster way to the CSIDH
M Meyer, S Reith
International Conference on Cryptology in India, 137-152, 2018
732018
On lions and elligators: An efficient constant-time implementation of CSIDH
M Meyer, F Campos, S Reith
International Conference on Post-Quantum Cryptography, 307-325, 2019
532019
Threshold schemes from isogeny assumptions
L De Feo, M Meyer
IACR International Conference on Public-Key Cryptography, 187-212, 2020
312020
On hybrid SIDH schemes using Edwards and Montgomery curve arithmetic
M Meyer, S Reith, F Campos
Cryptology ePrint Archive, 2017
212017
CTIDH: faster constant-time CSIDH
G Banegas, DJ Bernstein, F Campos, T Chou, T Lange, M Meyer, B Smith, ...
Cryptology ePrint Archive, 2021
172021
Trouble at the CSIDH: protecting CSIDH with dummy-operations against fault injection attacks
F Campos, MJ Kannwischer, M Meyer, H Onuki, M Stöttinger
2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 57-65, 2020
112020
Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem
C Costello, M Meyer, M Naehrig
Annual International Conference on the Theory and Applications of …, 2021
102021
Cryptographic Smooth Neighbors
G Bruno, MCR Santos, C Costello, JK Eriksen, M Naehrig, M Meyer, ...
Cryptology ePrint Archive, 2022
22022
Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE
F Campos, M Meyer, K Reijnders, M Stöttinger
Cryptology ePrint Archive, 2022
12022
Post-quantum cryptography for ECU security use cases
F Campos, M Meyer, S Sanwald, M Stöttinger, Y Wang
Ruhr-Universität Bochum, 2019
12019
Disorientation faults in CSIDH
G Banegas, J Krämer, T Lange, M Meyer, L Panny, K Reijnders, ...
Cryptology ePrint Archive, 2022
2022
Isogeny School 2020: Constant-time implementations of isogeny schemes
M Meyer
2021
Practical isogeny-based cryptography
M Meyer
Universität Würzburg, 2021
2021
Elliptische Kurven in der Post-Quantum-Kryptographie
M Meyer, S Reith
Mathematische Semesterberichte 66 (1), 31-47, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–14