Author of the publication

How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!

, , , and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 382-398. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions., , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 235-252. Springer, (2014)Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches., , , , , , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 390-406. Springer, (2011)Rigorous Security Requirements for Designated Verifier Signatures., , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 318-335. Springer, (2010)On strict estimation method of provable security against differential and linear cryptanalysis., , and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 258-268. Springer, (1997)Power Variance Analysis breaks a masked ASIC implementation of AES., , , , and . DATE, page 1059-1064. IEEE Computer Society, (2010)Efficient Private PEZ Protocols for Symmetric Functions., , and . TCC (1), volume 11891 of Lecture Notes in Computer Science, page 372-392. Springer, (2019)Confirmation that Some Hash Functions Are Not Collision Free., , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 326-343. Springer, (1990)Privacy-preserving smart metering with verifiability for both billing and energy management., , , , and . AsiaPKC@AsiaCCS, page 23-32. ACM, (2014)Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers., , , , and . ProvSec, volume 12505 of Lecture Notes in Computer Science, page 65-84. Springer, (2020)Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 481-496. Springer, (1989)