Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cell-Based Roadpricing., , and . EuroPKI, volume 7163 of Lecture Notes in Computer Science, page 106-122. Springer, (2011)The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper)., , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 339-345. Springer, (2016)An Efficient Self-blindable Attribute-Based Credential Scheme., , and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 3-20. Springer, (2017)SECDSA: Mobile signing and authentication under classical "sole control".. IACR Cryptol. ePrint Arch., (2021)Looking beyond XTR., , and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 46-63. Springer, (2002)Polymorphic Encryption and Pseudonymisation for Personalised Healthcare., , , , and . IACR Cryptology ePrint Archive, (2016)Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove.. IACR Cryptology ePrint Archive, (2016)Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems.. J. Cryptol., 17 (4): 277-296 (2004)Fast Irreducibility and Subgroup Membership Testing in XTR., and . Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, page 73-86. Springer, (2001)Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals., and . EUROCRYPT, volume 1233 of Lecture Notes in Computer Science, page 119-133. Springer, (1997)