Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

False Negative probabilities in Tardos codes., and . IACR Cryptology ePrint Archive, (2012)Consistent and Accurate Frequency Oracles under Local Differential Privacy., , , , and . CoRR, (2019)Security proof for round-robin differential phase shift QKD., and . Quantum Inf. Process., 17 (10): 250 (2018)Verifiable Rotation of Homomorphic Encryptions., , , and . Public Key Cryptography, volume 5443 of Lecture Notes in Computer Science, page 393-410. Springer, (2009)Physical Unclonable Functions for enhanced security of tokens and tags., and . ISSE, page 30-37. Vieweg, (2006)Robust Key Extraction from Physical Uncloneable Functions., , and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 407-422. (2005)Improving Frequency Estimation under Local Differential Privacy., , , and . WPES@CCS, page 123-135. ACM, (2020)Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes., , and . Des. Codes Cryptogr., 46 (2): 137-166 (2008)Tardos Fingerprinting is Better Than We Thought., , , and . IEEE Trans. Inf. Theory, 54 (8): 3663-3676 (2008)Decay-Based DRAM PUFs in Commodity Devices., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (3): 462-475 (2019)