Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles., and . SCN, volume 4116 of Lecture Notes in Computer Science, page 173-185. Springer, (2006)On the Generic Construction of Identity-Based Signatures with Additional Properties., , and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 178-193. Springer, (2006)Chosen Ciphertext Security with Optimal Ciphertext Overhead., , and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 355-371. Springer, (2008)The Algebraic Group Model and its Applications., , and . CRYPTO (2), volume 10992 of Lecture Notes in Computer Science, page 33-62. Springer, (2018)More Constructions of Lossy and Correlation-Secure Trapdoor Functions., , , , and . Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, page 279-295. Springer, (2010)The Pre-Shared Key Modes of HPKE., , , and . ASIACRYPT (6), volume 14443 of Lecture Notes in Computer Science, page 329-360. Springer, (2023)Secure Computation of the Mean and Related Statistics., , and . TCC, volume 3378 of Lecture Notes in Computer Science, page 283-302. Springer, (2005)An Algebraic Framework for Diffie-Hellman Assumptions., , , , and . CRYPTO (2), volume 8043 of Lecture Notes in Computer Science, page 129-147. Springer, (2013)Authenticated Key Exchange and Signatures with Tight Security in the Standard Model., , , , , , and . CRYPTO (4), volume 12828 of Lecture Notes in Computer Science, page 670-700. Springer, (2021)Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups., , and . Public Key Cryptography (1), volume 10769 of Lecture Notes in Computer Science, page 348-377. Springer, (2018)