Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

White-Box Cryptography: Don't Forget About Grey-Box Attacks., , , , , , , , and . J. Cryptol., 32 (4): 1095-1143 (2019)Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication., , , , , and . ACNS (2), volume 14584 of Lecture Notes in Computer Science, page 101-130. Springer, (2024)Key-Schedule Security for the TLS 1.3 Standard., , , , , and . ASIACRYPT (1), volume 13791 of Lecture Notes in Computer Science, page 621-650. Springer, (2022)Arithmetic Cryptography., , and . J. ACM, 64 (2): 10:1-10:74 (2017)Breaking DPA-protected Kyber via the pair-pointwise multiplication., , , , , and . IACR Cryptol. ePrint Arch., (2023)A State-Separating Proof for Yao's Garbling Scheme., and . IACR Cryptol. ePrint Arch., (2021)CryptoZoo: A Viewer for Reduction Proofs., , and . IACR Cryptol. ePrint Arch., (2023)New Random Oracle Instantiations from Extremely Lossy Functions., , , , and . IACR Cryptol. ePrint Arch., (2023)On Derandomizing Yao's Weak-to-Strong OWF Construction., , , and . IACR Cryptol. ePrint Arch., (2023)Security Analysis of the MLS Key Derivation., , and . SP, page 2535-2553. IEEE, (2022)