Author of the publication

Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication.

, , , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 98-127. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asymmetric PAKE with Low Computation and communication., , , and . EUROCRYPT (2), volume 13276 of Lecture Notes in Computer Science, page 127-156. Springer, (2022)A hidden-password online password manager., , , , , and . SAC, page 1683-1686. ACM, (2021)On Pseudorandom Encodings., , , , and . TCC (3), volume 12552 of Lecture Notes in Computer Science, page 639-669. Springer, (2020)Short Concurrent Covert Authenticated Key Exchange (Short cAKE)., , and . ASIACRYPT (8), volume 14445 of Lecture Notes in Computer Science, page 75-109. Springer, (2023)Randomized Half-Ideal Cipher on Groups with Applications to UC (a)PAKE., , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 128-156. Springer, (2023)Strong Asymmetric PAKE Based on Trapdoor CKEM., , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 798-825. Springer, (2019)Universally Composable Relaxed Password Authenticated Key Exchange., , , , , and . CRYPTO (1), volume 12170 of Lecture Notes in Computer Science, page 278-307. Springer, (2020)Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication., , , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 98-127. Springer, (2023)KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange., , and . CRYPTO (4), volume 12828 of Lecture Notes in Computer Science, page 701-730. Springer, (2021)Updatable Oblivious Key Management for Storage Systems., , and . ACM Conference on Computer and Communications Security, page 379-393. ACM, (2019)