Author of the publication

Quantum Non-malleability and Authentication.

, and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 310-341. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Entropy in Quantum Information Theory - Communication and Cryptography.. CoRR, (2018)Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM., , , and . CRYPTO (2), volume 13508 of Lecture Notes in Computer Science, page 729-757. Springer, (2022)Tight Adaptive Reprogramming in the QROM., , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 637-667. Springer, (2021)Post-Quantum Security of the Even-Mansour Cipher., , , and . EUROCRYPT (3), volume 13277 of Lecture Notes in Computer Science, page 458-487. Springer, (2022)Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability., , , and . CoRR, (2019)Can you sign a quantum state?, , and . Quantum, (2021)Secure Multi-party Quantum Computation with a Dishonest Majority., , , , and . IACR Cryptology ePrint Archive, (2019)SDitH in the QROM., , , , , and . ASIACRYPT (7), volume 14444 of Lecture Notes in Computer Science, page 317-350. Springer, (2023)A Guide for New Program Committee Members at Theoretical Computer Science Conferences., , , , , and . CoRR, (2021)Tight adaptive reprogramming in the QROM., , , and . IACR Cryptol. ePrint Arch., (2020)