Author of the publication

Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.

, , , and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 417-447. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin., , and . J. Syst. Softw., 82 (2): 346-354 (2009)Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections., , , , and . IEEE Trans. Mob. Comput., 23 (4): 3309-3327 (April 2024)An improved dynamic provable data possession model., , and . CCIS, page 290-295. IEEE, (2011)xVMP: An LLVM-based Code Virtualization Obfuscator., , , and . SANER, page 738-742. IEEE, (2023)Privacy-Preserving Authenticated Key Exchange in the Standard Model., , , and . ASIACRYPT (3), volume 13793 of Lecture Notes in Computer Science, page 210-240. Springer, (2022)PEDroid: Automatically Extracting Patches from Android App Updates., , , , and . ECOOP, volume 222 of LIPIcs, page 21:1-21:31. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Gnocchi: Multiplexed Payment Channels for Cryptocurrencies., , , , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 488-503. Springer, (2019)Redactable Blockchain Supporting Supervision and Self-Management., , , , and . AsiaCCS, page 844-858. ACM, (2021)Impossible Differential Attacks on Reduced-Round LBlock., , , and . ISPEC, volume 7232 of Lecture Notes in Computer Science, page 97-108. Springer, (2012)Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks., , , , , , , , and . KSII Trans. Internet Inf. Syst., 12 (7): 3421-3437 (2018)