Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimum Highpass Filter in Linear Phase Perfect Reconstruction QMF Bank., , , and . ISCAS, page 25-28. IEEE, (1994)CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q -type) Assumptions., , and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 3-22. Springer, (2019)Probabilistic Higher Order Differential Attack and Higher Order Bent Functions., and . ASIACRYPT, volume 1716 of Lecture Notes in Computer Science, page 62-74. Springer, (1999)Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited., and . AFRICACRYPT, volume 8469 of Lecture Notes in Computer Science, page 51-68. Springer, (2014)Efficient No-dictionary Verifiable Searchable Symmetric Encryption., and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 498-516. Springer, (2017)Root Finding Interpolation Attack., , and . Selected Areas in Cryptography, volume 2012 of Lecture Notes in Computer Science, page 303-314. Springer, (2000)How to Re-use Round Function in Super-Pseudorandom Permutation., and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 224-235. Springer, (2004)2-Pass Key Exchange Protocols from CPA-Secure KEM., and . CT-RSA, volume 8366 of Lecture Notes in Computer Science, page 385-401. Springer, (2014)Optimum Traitor Tracing and Asymmetric Schemes., and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 145-157. Springer, (1998)How to Break a Practical MIX and Design a New One., and . EUROCRYPT, volume 1807 of Lecture Notes in Computer Science, page 557-572. Springer, (2000)