Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

(Universal) Unconditional Verifiability in E-Voting without Trusted Parties., , , , and . IACR Cryptology ePrint Archive, (2016)vVote: a Verifiable Voting System (DRAFT)., , , and . CoRR, (2014)Trustworthy exams without trusted parties., , , and . Comput. Secur., (2017)Batching CSIDH Group Actions using AVX-512., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 618-649 (2021)Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co., , , , , , , and . CSF, page 335-347. IEEE, (2022)Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers., , , and . CARDIS, volume 12609 of Lecture Notes in Computer Science, page 18-33. Springer, (2020)Proving Prêt à Voter Receipt Free Using Computational Security Models., , and . EVT/WOTE, USENIX Association, (2013)Permutations in Prêt à Voter., and . EVT/WOTE, USENIX Association, (2009)Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer., , and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 330-349. Springer, (2021)Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals., , , , , , and . WIFS, page 1-6. IEEE, (2017)