Author of the publication

(R)CCA Secure Updatable Encryption with Integrity Protection.

, , and . EUROCRYPT (1), volume 11476 of Lecture Notes in Computer Science, page 68-99. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalytic Time-Memory Tradeoffs on COPACOBANA., , and . GI Jahrestagung (2), volume P-110 of LNI, page 205-209. GI, (2007)P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection., , , , and . IACR Cryptol. ePrint Arch., (2018)Onion Routing with Replies., , , and . ASIACRYPT (2), volume 13091 of Lecture Notes in Computer Science, page 573-604. Springer, (2021)P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation., , , , and . IACR Cryptol. ePrint Arch., (2019)Universally Composable Auditable Surveillance., , , , and . ASIACRYPT (2), volume 14439 of Lecture Notes in Computer Science, page 453-487. Springer, (2023)Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited., , and . CCS, page 2093-2110. ACM, (2019)(R)CCA Secure Updatable Encryption with Integrity Protection., , and . EUROCRYPT (1), volume 11476 of Lecture Notes in Computer Science, page 68-99. Springer, (2019)