Author of the publication

Tightly secure signature schemes from the LWE and subset sum assumptions.

, , , and . Theor. Comput. Sci., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compact Structure-Preserving Signatures with Almost Tight Security., , , , and . J. Cryptol., 36 (4): 37 (October 2023)Signed (Group) Diffie-Hellman Key Exchange with Tight Security., , and . J. Cryptol., 35 (4): 26 (2022)Robust Autonomous Vehicle Pursuit without Expert Steering Labels., , , , and . CoRR, (2023)A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange., and . ASIACRYPT (8), volume 14445 of Lecture Notes in Computer Science, page 143-175. Springer, (2023)Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV., , , and . CT-RSA, volume 13871 of Lecture Notes in Computer Science, page 645-671. Springer, (2023)Lattice-Based Signatures with Tight Adaptive Corruptions and More., and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 347-378. Springer, (2022)Shorter QA-NIZK and SPS with Tighter Security., , , , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 669-699. Springer, (2019)Towards Instantiating the Algebraic Group Model., and . IACR Cryptology ePrint Archive, (2019)Mention-centered Graph Neural Network for Document-level Relation Extraction., , and . CoRR, (2021)Unbounded HIBE with Tight Security., and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 129-159. Springer, (2020)