Author of the publication

Subversion-Resilient Authenticated Encryption Without Random Oracles.

, , , , and . ACNS, volume 13906 of Lecture Notes in Computer Science, page 460-483. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tightly-Secure Authenticated Key Exchange, Revisited., , , and . IACR Cryptol. ePrint Arch., (2020)Highly Efficient Key Exchange Protocols with Optimal Tightness., , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 767-797. Springer, (2019)On Tight Security Proofs for Schnorr Signatures., , and . J. Cryptol., 32 (2): 566-599 (2019)On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments., and . J. Cryptol., 34 (3): 30 (2021)Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT., , and . J. Cryptol., 34 (3): 20 (2021)Subversion-Resilient Authenticated Encryption Without Random Oracles., , , , and . ACNS, volume 13906 of Lecture Notes in Computer Science, page 460-483. Springer, (2023)Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract)., , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 64-85. Springer, (2021)More Efficient Digital Signatures with Tight Multi-user Security., , , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 1-31. Springer, (2021)Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol., , , , , , and . CRYPTO (4), volume 14084 of Lecture Notes in Computer Science, page 330-361. Springer, (2023)On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation., , , and . CRYPTO (4), volume 14084 of Lecture Notes in Computer Science, page 297-329. Springer, (2023)