Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary., and . EUROCRYPT (3), volume 11478 of Lecture Notes in Computer Science, page 472-499. Springer, (2019)Quantum Authentication and Encryption with Key Recycling., and . IACR Cryptology ePrint Archive, (2017)Secure identification and QKD in the bounded-quantum-storage model., , , and . Theor. Comput. Sci., (2014)Parallel Repetition of (k1, đots, kμ)-Special-Sound Multi-Round Interactive Proofs., and . IACR Cryptol. ePrint Arch., (2021)Unfair Noisy Channels and Oblivious Transfer., , , and . TCC, volume 2951 of Lecture Notes in Computer Science, page 355-373. Springer, (2004)From Classical to Quantum Information - Or: When You Have Less Than No Uncertainty.. ERCIM News, (2018)Position-Based Quantum Cryptography., , and . ERCIM News, 2011 (85): 16-17 (2011)One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games., , , and . EUROCRYPT, volume 7881 of Lecture Notes in Computer Science, page 609-625. Springer, (2013)Fiat-Shamir Transformation of Multi-round Interactive Proofs., , and . TCC (1), volume 13747 of Lecture Notes in Computer Science, page 113-142. Springer, (2022)Adaptive Versus Static Multi-oracle Algorithms, and Quantum Security of a Split-Key PRF., , and . TCC (1), volume 13747 of Lecture Notes in Computer Science, page 33-51. Springer, (2022)