Author of the publication

Quantum-Access-Secure Message Authentication via Blind-Unforgeability.

, , , and . EUROCRYPT (3), volume 12107 of Lecture Notes in Computer Science, page 788-817. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online Metric Tracking and Smoothing., and . Algorithmica, 68 (1): 133-151 (2014)The power of basis selection in fourier sampling: hidden subgroup problems in affine groups., , , and . SODA, page 1113-1122. SIAM, (2004)A note on the set systems used for broadcast encryption., and . SODA, page 470-471. ACM/SIAM, (2003)Ledger Combiners for Fast Settlement., , , and . TCC (1), volume 12550 of Lecture Notes in Computer Science, page 322-352. Springer, (2020)Distributed Cooperation and Adversity: Complexity Trade-Offs., , and . PCK50, page 60-71. ACM, (2003)An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal., , , , , and . EVT, USENIX Association, (2007)Automating Voting Terminal Event Log Analysis., , , , , , , and . EVT/WOTE, USENIX Association, (2009)A Note on the Representational Incompatibility of Function Approximation and Factored Dynamics., , , , and . NIPS, page 431-437. MIT Press, (2002)Adaptively Secure Random Beacons for Ungrindable Blockchains., , , and . ICDCS, page 62-72. IEEE, (2023)A Composable Security Treatment of ECVRF and Batch Verifications., , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 22-41. Springer, (2022)