Author of the publication

Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication.

, , , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 98-127. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pseudorandomness and computational difficulty.. Technion - Israel Institute of Technology, Israel, (1990)On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding., , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 380-409. Springer, (2021)PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets., , , , , , and . WWW, page 594-604. ACM, (2019)Universally Composable Notions of Key Exchange and Secure Channels., and . EUROCRYPT, volume 2332 of Lecture Notes in Computer Science, page 337-351. Springer, (2002)The Shrinking Generator., , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 22-39. Springer, (1993)The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?).. CRYPTO, volume 2139 of Lecture Notes in Computer Science, page 310-331. Springer, (2001)Secret Sharing Made Short.. CRYPTO, volume 773 of Lecture Notes in Computer Science, page 136-146. Springer, (1993)LFSR-based Hashing and Authentication.. CRYPTO, volume 839 of Lecture Notes in Computer Science, page 129-139. Springer, (1994)Cryptographic Extraction and Key Derivation: The HKDF Scheme.. CRYPTO, volume 6223 of Lecture Notes in Computer Science, page 631-648. Springer, (2010)The OPTLS Protocol and TLS 1.3., and . EuroS&P, page 81-96. IEEE, (2016)