Author of the publication

Oblivious Multi-variate Polynomial Evaluation.

, and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 430-442. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tuple Cryptanalysis: Slicing and Fusing Multisets., and . Mycrypt, volume 10311 of Lecture Notes in Computer Science, page 294-320. Springer, (2016)Integral Distinguishers of Some SHA-3 Candidates., , and . CANS, volume 6467 of Lecture Notes in Computer Science, page 106-123. Springer, (2010)Oblivious Multi-variate Polynomial Evaluation., and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 430-442. Springer, (2009)Analysis of Reduced-SHAvite-3-256 v2., , and . FSE, volume 6733 of Lecture Notes in Computer Science, page 68-87. Springer, (2011)Stochastic Cryptanalysis of Crypton., and . FSE, volume 1978 of Lecture Notes in Computer Science, page 121-133. Springer, (2000)The GLUON Family: A Lightweight Hash Function Family Based on FCSRs., , , , and . AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 306-323. Springer, (2012)A White-Box Encryption Scheme using Physically Unclonable Functions., , and . ICETE (2), page 279-286. ScitePress, (2020)How Secure are Secure Localization Protocols in WSNs?, , and . S-CUBE, volume 57 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 164-178. Springer, (2010)Constraint Programming Models for Chosen Key Differential Cryptanalysis., , and . CP, volume 9892 of Lecture Notes in Computer Science, page 584-601. Springer, (2016)Aggregated Authentication (AMAC) Using Universal Hash Functions., , and . SecureComm, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 248-264. Springer, (2009)