Author of the publication

Enforcing Email Addresses Privacy Using Tokens.

, and . CISC, volume 3822 of Lecture Notes in Computer Science, page 91-100. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authenticated Encryption with Variable Stretch., , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 396-425. (2016)Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity., and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 343-362. Springer, (2019)Sound Proof of Proximity of Knowledge.. ProvSec, volume 9451 of Lecture Notes in Computer Science, page 105-126. Springer, (2015)On Privacy for RFID.. ProvSec, volume 9451 of Lecture Notes in Computer Science, page 3-20. Springer, (2015)Resistance Against General Iterated Attacks.. EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 255-271. Springer, (1999)Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard., , , and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 77-85. Springer, (1994)On the Lai-Massey Scheme.. ASIACRYPT, volume 1716 of Lecture Notes in Computer Science, page 8-19. Springer, (1999)Efficient Public-Key Distance Bounding Protocol., and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 873-901. (2016)Distance Bounding Based on PUF., and . CANS, volume 10052 of Lecture Notes in Computer Science, page 701-710. (2016)On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.. CISC, volume 3822 of Lecture Notes in Computer Science, page 1-9. Springer, (2005)