Author of the publication

On the Possibility of a Backdoor in the Micali-Schnorr Generator.

, , , , and . Public Key Cryptography (1), volume 14601 of Lecture Notes in Computer Science, page 352-386. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical State Recovery Attacks against Legacy RNG Implementations., , and . ACM Conference on Computer and Communications Security, page 265-280. ACM, (2018)On the Possibility of a Backdoor in the Micali-Schnorr Generator., , , , and . Public Key Cryptography (1), volume 14601 of Lecture Notes in Computer Science, page 352-386. Springer, (2024)A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation., , , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 587-603. Springer, (2016)A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report., and . HealthSec, USENIX Association, (2011)A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK., , and . IACR Cryptology ePrint Archive, (2017)McFIL: Model Counting Functionality-Inherent Leakage., , and . USENIX Security Symposium, page 7001-7018. USENIX Association, (2023)Keynote: On Subverting Trust.. NDSS, The Internet Society, (2016)Securing electronic medical records using attribute-based encryption on mobile devices., , , , , and . SPSM@CCS, page 75-86. ACM, (2011)A Multi-party Protocol for Constructing the Public Parameters of the Pinocchio zk-SNARK., , and . Financial Cryptography Workshops, volume 10958 of Lecture Notes in Computer Science, page 64-77. Springer, (2018)Forward Secure Asynchronous Messaging from Puncturable Encryption., and . IEEE Symposium on Security and Privacy, page 305-320. IEEE Computer Society, (2015)