Author of the publication

Analyzing and Fixing the QACCE Security of QUIC.

, , , and . SSR, volume 10074 of Lecture Notes in Computer Science, page 1-31. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing., and . ICETE (2), page 322-329. ScitePress, (2020)Analyzing and Fixing the QACCE Security of QUIC., , , and . SSR, volume 10074 of Lecture Notes in Computer Science, page 1-31. Springer, (2016)Anonymous Fingerprinting for Predelivery of Contents., , and . ICISC, volume 5461 of Lecture Notes in Computer Science, page 134-151. Springer, (2008)On the (In)Efficiency of Non-Interactive Secure Multiparty Computation., and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 185-193. Springer, (2015)On the Communication Complexity of Private Function Sharing and Computation.. ISIT, page 258-263. IEEE, (2023)On the Security of Tag-KEM for Signcryption., and . WCAN@ICALP, volume 171 of Electronic Notes in Theoretical Computer Science, page 83-91. Elsevier, (2006)Secure Communication via GNSS-based Key Synchronization., , and . WIPHAL, volume 3434 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Expiration Dated Fingerprinting., and . IIH-MSP, page 147-150. IEEE Computer Society, (2008)New hybrid additive-multiplicative watermarking with better tradeoff between image quality and detection accuracy., , and . ISITA, page 797-801. IEEE, (2012)Detection of Cheaters in Non-interactive Polynomial Evaluation., and . IACR Cryptology ePrint Archive, (2013)