Author of the publication

Towards Efficient LPN-Based Symmetric Encryption.

, , , and . ACNS (2), volume 12727 of Lecture Notes in Computer Science, page 208-230. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clever Arbiters Versus Malicious Adversaries - On the Gap Between Known-Input Security and Chosen-Input Security.. The New Codebreakers, volume 9100 of Lecture Notes in Computer Science, page 497-517. Springer, (2016)Boosting OMD for Almost Free Authentication of Associated Data., , and . FSE, volume 9054 of Lecture Notes in Computer Science, page 411-427. Springer, (2015)Timed-Release Encryption with Master Time Bound Key., and . WISA, volume 11897 of Lecture Notes in Computer Science, page 167-179. Springer, (2019)The Extended Access Control for Machine Readable Travel Documents., and . BIOSIG, volume P-155 of LNI, page 93-103. GI, (2009)The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption., , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 97-117. Springer, (2005)Distance Bounding Based on PUF., and . CANS, volume 10052 of Lecture Notes in Computer Science, page 701-710. (2016)On the Lai-Massey Scheme.. ASIACRYPT, volume 1716 of Lecture Notes in Computer Science, page 8-19. Springer, (1999)Efficient Public-Key Distance Bounding Protocol., and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 873-901. (2016)Authenticated Encryption with Variable Stretch., , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 396-425. (2016)Optimization of the MOVA Undeniable Signature Scheme., , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 196-209. Springer, (2005)