From post

Quantum Authentication and Encryption with Key Recycling - Or: How to Re-use a One-Time Pad Even if P=NP - Safely & Feasibly.

, и . EUROCRYPT (3), том 10212 из Lecture Notes in Computer Science, стр. 311-338. (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Power of Two-Party Quantum Cryptography., , и . ASIACRYPT, том 5912 из Lecture Notes in Computer Science, стр. 70-87. Springer, (2009)Merkle Puzzles in a Quantum World., , , , , и . CRYPTO, том 6841 из Lecture Notes in Computer Science, стр. 391-410. Springer, (2011)Powerful Primitives in the Bounded Quantum Storage Model., и . CoRR, (2023)Quantum Oblivious Mutual Identification., и . EUROCRYPT, том 921 из Lecture Notes in Computer Science, стр. 133-146. Springer, (1995)A Tight High-Order Entropic Quantum Uncertainty Relation with Applications., , , , и . CRYPTO, том 4622 из Lecture Notes in Computer Science, стр. 360-378. Springer, (2007)Practical Relativistic Zero-Knowledge for NP., , , , и . IACR Cryptol. ePrint Arch., (2019)Key Establishment à la Merkle in a Quantum World., , , , , и . J. Cryptol., 32 (3): 601-634 (2019)Improving the Security of Quantum Protocols via Commit-and-Open., , , , и . CRYPTO, том 5677 из Lecture Notes in Computer Science, стр. 408-427. Springer, (2009)Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks., , и . CRYPTO, том 3152 из Lecture Notes in Computer Science, стр. 254-272. Springer, (2004)Superposition Attacks on Cryptographic Protocols., , , и . ICITS, том 8317 из Lecture Notes in Computer Science, стр. 142-161. Springer, (2013)