Author of the publication

Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).

, , , , , , and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 114-127. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved key establishment scheme for wireless sensor network., , and . CFI, page 70-71. ACM, (2011)On the security of a password-only authenticated three-party key exchange protocol., , , and . IACR Cryptology ePrint Archive, (2013)Association Rule Extraction from XML Stream Data for Wireless Sensor Networks., , , and . Sensors, 14 (7): 12937-12957 (2014)Advanced Malware Variant Detection Algorithm Using Structural Characteristic of Executable File., , and . FGIT, volume 7105 of Lecture Notes in Computer Science, page 301-308. Springer, (2011)Improvement on a Biometric-Based Key Agreement and Authentication Scheme for the Multi-server Environments., , , , , and . ICCSA (1), volume 10960 of Lecture Notes in Computer Science, page 541-557. Springer, (2018)Two efficient RSA multisignature schemes., , , and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 217-222. Springer, (1997)Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks., , and . ICCSA (4), volume 9789 of Lecture Notes in Computer Science, page 289-301. Springer, (2016)On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol., and . GPC, volume 7861 of Lecture Notes in Computer Science, page 730-736. Springer, (2013)Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks., , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 752-760. Springer, (2013)Security Requirement of End Point Security Software., , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 788-795. Springer, (2013)