Author of the publication

Elastic block ciphers: method, security and instantiations.

, , and . Int. J. Inf. Sec., 8 (3): 211-231 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption., , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 98-128. Springer, (2020)Threshold Cryptosystems Based on Factoring., and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 192-205. Springer, (2002)On the Security of ElGamal Based Encryption., and . Public Key Cryptography, volume 1431 of Lecture Notes in Computer Science, page 117-134. Springer, (1998)Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic., , , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 237-255. Springer, (2022)GDPR - Challenges for Reconciling Legal Rules with Technical Reality., , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 736-755. Springer, (2020)Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance., and . CSCML, volume 12716 of Lecture Notes in Computer Science, page 379-396. Springer, (2021)Access regulation mechanism for switch-based LAN., and . Comput. Networks, 31 (5): 505-518 (1999)Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions., , and . ICALP, volume 55 of LIPIcs, page 30:1-30:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)Special Issue on Advanced Persistent Threat., , , and . Future Gener. Comput. Syst., (2018)The combinatorics of hidden diversity., , , and . Theor. Comput. Sci., (2020)