From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Tight Security Proofs for Schnorr Signatures., , и . J. Cryptol., 32 (2): 566-599 (2019)On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments., и . J. Cryptol., 34 (3): 30 (2021)Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT., , и . J. Cryptol., 34 (3): 20 (2021)Highly Efficient Key Exchange Protocols with Optimal Tightness., , , , и . CRYPTO (3), том 11694 из Lecture Notes in Computer Science, стр. 767-797. Springer, (2019)Tightly-Secure Authenticated Key Exchange, Revisited., , , и . IACR Cryptol. ePrint Arch., (2020)Automated Information Leakage Detection: A New Method Combining Machine Learning and Hypothesis Testing with an Application to Side-channel Detection in Cryptographic Protocols., , , , , и . ICAART (2), стр. 152-163. SCITEPRESS, (2022)More Efficient Digital Signatures with Tight Multi-user Security., , , и . Public Key Cryptography (2), том 12711 из Lecture Notes in Computer Science, стр. 1-31. Springer, (2021)Subversion-Resilient Authenticated Encryption Without Random Oracles., , , , и . ACNS, том 13906 из Lecture Notes in Computer Science, стр. 460-483. Springer, (2023)Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract)., , , и . ESORICS (2), том 12973 из Lecture Notes in Computer Science, стр. 64-85. Springer, (2021)Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol., , , , , , и . CRYPTO (4), том 14084 из Lecture Notes in Computer Science, стр. 330-361. Springer, (2023)