Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware security without secure hardware: How to decrypt with a password and a server., , , , , and . Theor. Comput. Sci., (2021)Efficient Fully Secure Leakage-Deterring Encryption., , and . IMACC, volume 11929 of Lecture Notes in Computer Science, page 102-127. Springer, (2019)Attribute-based Single Sign-On: Secure, Private, and Efficient., , , and . IACR Cryptol. ePrint Arch., (2023)KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip., and . IACR Cryptol. ePrint Arch., (2021)Succinct Diophantine-Satisfiability Arguments., and . ASIACRYPT (3), volume 12493 of Lecture Notes in Computer Science, page 774-804. Springer, (2020)Short Threshold Dynamic Group Signatures., , , , and . SCN, volume 12238 of Lecture Notes in Computer Science, page 401-423. Springer, (2020)Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server., , , , , and . IACR Cryptol. ePrint Arch., (2020)Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments., and . IACR Cryptol. ePrint Arch., (2023)Privacy-preserving cryptographic protocols. (Protocoles cryptographiques pour la protection de la vie privée).. PSL Research University, Paris, France, (2020)Zone Encryption with Anonymous Authentication for V2V Communication., , , , and . EuroS&P, page 405-424. IEEE, (2020)