Author of the publication

SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice.

, , and . CT-RSA, volume 14643 of Lecture Notes in Computer Science, page 433-459. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes., and . WCC, volume 3969 of Lecture Notes in Computer Science, page 275-290. Springer, (2005)Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition., , and . IACR Cryptology ePrint Archive, (2019)Decomposition of Permutations in a Finite Field., , and . IACR Cryptology ePrint Archive, (2018)New Monotone Span Programs from Old., and . IACR Cryptology ePrint Archive, (2004)On Zigzag Functions and Related Objects in New Metric., , and . IACR Cryptology ePrint Archive, (2006)On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes., and . IACR Cryptology ePrint Archive, (2003)Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application., , , , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 309-323. Springer, (2009)On Unconditionally Secure Distributed Oblivious Transfer., , , and . INDOCRYPT, volume 2551 of Lecture Notes in Computer Science, page 395-408. Springer, (2002)Some Applications of Bounds for Designs to the Cryptography., and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 25-34. Springer, (1999)Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm., , and . BalkanCryptSec, volume 9540 of Lecture Notes in Computer Science, page 31-42. Springer, (2015)