Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Subversion-Resistant SNARK., , , and . ASIACRYPT (3), volume 10626 of Lecture Notes in Computer Science, page 3-33. Springer, (2017)Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs., and . IACR Cryptology ePrint Archive, (2020)Breaking anonymity of some recent lightweight RFID authentication protocols., , , and . Wirel. Networks, 25 (3): 1235-1252 (2019)Enhancing privacy of recent authentication schemes for low-cost RFID systems., , , and . ISC Int. J. Inf. Secur., 7 (2): 135-149 (2015)Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable., , , and . IACR Cryptol. ePrint Arch., (2023)Two-Round Concurrent 2PC from Sub-Exponential LWE., , , , , and . IACR Cryptol. ePrint Arch., (2022)Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard., , , and . IST, page 111-116. IEEE, (2016)On Subversion-Resistant SNARKs., , , and . J. Cryptol., 34 (3): 17 (2021)On Subversion-Resistant SNARKs., , , and . IACR Cryptol. ePrint Arch., (2020)CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments., and . INDOCRYPT, volume 13774 of Lecture Notes in Computer Science, page 3-25. Springer, (2022)