Author of the publication

Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions.

, , , , , and . Public Key Cryptography (4), volume 14604 of Lecture Notes in Computer Science, page 257-288. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing Secure Multi-Party Computation with Identifiable Abort., , , and . IACR Cryptol. ePrint Arch., (2020)Challenges and Opportunities of Cloud Computing -- Trade-off Decisions in Cloud Computing Architecture, , , , , , , and . 2010-19. Karlsruhe Institue of Technology, Faculty of Informatics, (2010)Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules., , , , , and . Proc. Priv. Enhancing Technol., 2021 (4): 312-338 (2021)Cryptanalysis of a practical quantum key distribution with polarization-entangled photons., , and . Quantum Inf. Comput., 5 (3): 181-186 (2005)Composable Long-Term Security with Rewinding., , , , , , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 510-541. Springer, (2023)Universally Composable Auditable Surveillance., , , , and . ASIACRYPT (2), volume 14439 of Lecture Notes in Computer Science, page 453-487. Springer, (2023)On Group Key Agreement with Cheater Identification, , and . Western European Workshop on Research in Cryptology, WEWoRC 2005, (2005)Towards Realising Oblivious Voting., , , , and . ICETE (Selected Papers), volume 764 of Communications in Computer and Information Science, page 216-240. Springer, (2016)On the problem of authentication in a quantum protocol to detect traffic analysis., and . Quantum Inf. Comput., 3 (1): 48-54 (2003)And Paper-Based is Better? Towards Comparability of Classic and Cryptographic Voting Schemes., , , , and . IACR Cryptol. ePrint Arch., (2021)