List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Secure boot in post-quantum era (invited paper) | 2024-10-23 | Paper |
| Patent landscape in the field of hash-based post-quantum signatures (invited paper) | 2024-10-23 | Paper |
| A new authenticated encryption technique for handling long ciphertexts in memory constrained devices International Journal of Applied Cryptography | 2018-11-26 | Paper |
| Collision attack on 4-branch, type-2 GFN based hash functions using sliced biclique cryptanalysis technique Information Security and Cryptology | 2015-11-25 | Paper |
| Sp-AELM: sponge based authenticated encryption scheme for memory constrained devices Information Security and Privacy | 2015-10-20 | Paper |
Research outcomes over time
This page was built for person: Megha Agrawal