Author of the publication

A Tamper and Leakage Resilient von Neumann Architecture.

, , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 579-603. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Round MPC from LWE via Multi-Key FHE., and . IACR Cryptology ePrint Archive, (2015)Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 626-642. Springer, (2022)A More Complete Analysis of the Signal Double Ratchet Algorithm., , , , and . CRYPTO (1), volume 13507 of Lecture Notes in Computer Science, page 784-813. Springer, (2022)Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits., , , and . EUROCRYPT, volume 8441 of Lecture Notes in Computer Science, page 111-128. Springer, (2014)PASTA: PASsword-based Threshold Authentication., , , and . CCS, page 2042-2059. ACM, (2018)Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space., , , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 467-495. Springer, (2019)BETA: Biometric Enabled Threshold Authentication., , , , and . IACR Cryptol. ePrint Arch., (2020)Threshold Signatures in the Multiverse., , , , , , and . SP, page 1454-1470. IEEE, (2023)Continuous Non-malleable Codes., , , and . TCC, volume 8349 of Lecture Notes in Computer Science, page 465-488. Springer, (2014)The Chaining Lemma and Its Application., , , and . ICITS, volume 9063 of Lecture Notes in Computer Science, page 181-196. Springer, (2015)