Author of the publication

Composable Long-Term Security with Rewinding.

, , , , , , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 510-541. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hidden Δ-fairness: A Novel Notion for Fair Secure Two-Party Computation., , , , and . IACR Cryptol. ePrint Arch., (2024)Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules., , , , , and . Proc. Priv. Enhancing Technol., 2021 (4): 312-338 (2021)Security in a Distributed Key Management Approach, , , , and . (2017)Composable Long-Term Security with Rewinding., , , , , , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 510-541. Springer, (2023)Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution with SGX, and . (2017)Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework., , , , , , , and . IACR Cryptol. ePrint Arch., (2019)Security in a Distributed Key Management Approach., , , , and . CBMS, page 816-821. IEEE Computer Society, (2017)SES-14: Sichere und zuverlässliche Systeme: Datensouveränität., , , , , and . GI-Jahrestagung, volume P-307 of LNI, page 111-113. GI, (2020)IT-Sicherheit - ein rechtsfreier Raum?, , and . Datenschutz und Datensicherheit, 42 (5): 286-290 (2018)Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions., , and . TCC (1), volume 13042 of Lecture Notes in Computer Science, page 750-781. Springer, (2021)