Author of the publication

Highly Efficient Key Exchange Protocols with Optimal Tightness.

, , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 767-797. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Highly Efficient Key Exchange Protocols with Optimal Tightness., , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 767-797. Springer, (2019)Verifiable Decryption in the Head., , , , and . IACR Cryptol. ePrint Arch., (2021)On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation., , , and . CRYPTO (4), volume 14084 of Lecture Notes in Computer Science, page 297-329. Springer, (2023)Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme., , and . NordSec, volume 12556 of Lecture Notes in Computer Science, page 92-107. Springer, (2020)Machine-Checked Proofs of Accountability: How to sElect Who is to Blame., , , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 471-491. Springer, (2023)A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability., and . Financial Cryptography Workshops, volume 10323 of Lecture Notes in Computer Science, page 404-418. Springer, (2017)A Novel Framework for Protocol Analysis., , and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 340-347. Springer, (2011)An experiment on the security of the Norwegian electronic voting protocol., and . Ann. des Télécommunications, 71 (7-8): 299-307 (2016)Lattice-Based Proof of Shuffle and Applications to Electronic Voting., , , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 227-251. Springer, (2021)A framework for compositional verification of security protocols., , , , , and . Inf. Comput., 206 (2-4): 425-459 (2008)