From post

Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC.

, , , , и . TCC (3), том 12552 из Lecture Notes in Computer Science, стр. 1-30. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-Protocol UC and its Use for Building Modular and Efficient Protocols., , и . IACR Cryptology ePrint Archive, (2019)Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design., , и . IACR Cryptology ePrint Archive, (2013)The Transaction Graph for Modeling Blockchain Semantics., , , , и . IACR Cryptol. ePrint Arch., (2017)Per-session security: Password-based cryptography revisited., , , и . J. Comput. Secur., 27 (1): 75-111 (2019)Anonymity-Preserving Public-Key Encryption: A Constructive Approach., , , , и . Privacy Enhancing Technologies, том 7981 из Lecture Notes in Computer Science, стр. 19-39. Springer, (2013)A Constructive Perspective on Key Encapsulation., , и . Number Theory and Cryptography, том 8260 из Lecture Notes in Computer Science, стр. 226-239. Springer, (2013)Causal Boxes: Quantum Information-Processing Systems Closed Under Composition., , , , и . IEEE Trans. Inf. Theory, 63 (5): 3277-3305 (2017)On Composable Security for Digital Signatures., , и . Public Key Cryptography (1), том 10769 из Lecture Notes in Computer Science, стр. 494-523. Springer, (2018)Privacy-preserving auditable token payments in a permissioned blockchain system., , , , , и . AFT, стр. 255-267. ACM, (2020)Nonces Are Noticed: AEAD Revisited., , и . CRYPTO (1), том 11692 из Lecture Notes in Computer Science, стр. 235-265. Springer, (2019)