The 2-Minute Rule for cryptography conferences
Andreas’ performs range from theoretical operates, like how to model quantum assaults or formal protection arguments in submit-quantum protection styles, to applied performs, much like the Investigation of aspect-channel attacks or the event of productive hash-based mostly signature strategies. In lots of my will work, Andreas tries to combine th