DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning
Wavelet: Code-based postquantum signatures with fast verification on microcontrollers
CTIDH: faster constant-time CSIDH
Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
Concrete quantum cryptanalysis of binary elliptic curves
Don't Forget Your Roots Constant-Time Root Finding over $\mathbb{F}_{2^m}$
A Reaction Attack against Cryptosystems based on LRPC Codes
DAGS: Reloaded Revisiting Dyadic Key Encapsulation
DAGS: Key Encapsulation using Dyadic GS Codes
Designing Efficient Dyadic Operations for Cryptographic Applications
DAGS: Key Encapsulation using Dyadic GS Codes