Author of the publication

Quantum-Access-Secure Message Authentication via Blind-Unforgeability.

, , , and . EUROCRYPT (3), volume 12107 of Lecture Notes in Computer Science, page 788-817. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fundamental limitations and intrinsic limits of feedback: An overview in an information age., , and . Annu. Rev. Control., (2019)General Linear Group Action on Tensors: A Candidate for Post-quantum Cryptography., , , and . TCC (1), volume 11891 of Lecture Notes in Computer Science, page 251-281. Springer, (2019)Pseudorandom Quantum States., , and . CRYPTO (3), volume 10993 of Lecture Notes in Computer Science, page 126-152. Springer, (2018)A Cryptographic Perspective on the Verifiability of Quantum Advantage., , , and . CoRR, (2023)Fundamental Stealthiness-Distortion Tradeoffs in Dynamical (Control) Systems under Injection Attacks: A Power Spectral Analysis., and . CoRR, (2020)Relationship Between Interatrial Septal Thickness and Left Atrial Geometry Assessed by Echocardiography in Patients with Rheumatic Mitral Stenosis., , , and . J. Medical Imaging Health Informatics, 10 (5): 994-997 (2020)Oblivious Transfer is in MiniQCrypt., , , and . IACR Cryptol. ePrint Arch., (2020)'Periodically-active phenomenon' of DIS-NCS with scattering transformation., , and . Int. J. Control, 84 (8): 1467-1476 (2011)A Note on Quantum Security for Post-Quantum Cryptography.. PQCrypto, volume 8772 of Lecture Notes in Computer Science, page 246-265. Springer, (2014)Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks., and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 283-309. Springer, (2017)