Author of the publication

Enforcing Email Addresses Privacy Using Tokens.

, and . CISC, volume 3822 of Lecture Notes in Computer Science, page 91-100. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges., and . ProvSec, volume 8209 of Lecture Notes in Computer Science, page 121-138. Springer, (2013)New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair., , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 303-331. Springer, (2021)Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem., and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 28-47. Springer, (2021)The Extended Access Control for Machine Readable Travel Documents., and . BIOSIG, volume P-155 of LNI, page 93-103. GI, (2009)Timed-Release Encryption with Master Time Bound Key., and . WISA, volume 11897 of Lecture Notes in Computer Science, page 167-179. Springer, (2019)Optimization of the MOVA Undeniable Signature Scheme., , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 196-209. Springer, (2005)An Experiment on DES Statistical Cryptanalysis.. ACM Conference on Computer and Communications Security, page 139-147. ACM, (1996)Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity., and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 343-362. Springer, (2019)On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.. CISC, volume 3822 of Lecture Notes in Computer Science, page 1-9. Springer, (2005)Clever Arbiters Versus Malicious Adversaries - On the Gap Between Known-Input Security and Chosen-Input Security.. The New Codebreakers, volume 9100 of Lecture Notes in Computer Science, page 497-517. Springer, (2016)