Author of the publication

Subversion-Resilient Public Key Encryption with Practical Watchdogs.

, , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 627-658. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Highly Efficient Key Exchange Protocols with Optimal Tightness., , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 767-797. Springer, (2019)More Efficient Digital Signatures with Tight Multi-user Security., , , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 1-31. Springer, (2021)Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract)., , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 64-85. Springer, (2021)Automated Information Leakage Detection: A New Method Combining Machine Learning and Hypothesis Testing with an Application to Side-channel Detection in Cryptographic Protocols., , , , , and . ICAART (2), page 152-163. SCITEPRESS, (2022)Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol., , , , , , and . CRYPTO (4), volume 14084 of Lecture Notes in Computer Science, page 330-361. Springer, (2023)On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation., , , and . CRYPTO (4), volume 14084 of Lecture Notes in Computer Science, page 297-329. Springer, (2023)On Tight Security Proofs for Schnorr Signatures., , and . J. Cryptol., 32 (2): 566-599 (2019)Subversion-Resilient Authenticated Encryption Without Random Oracles., , , , and . ACNS, volume 13906 of Lecture Notes in Computer Science, page 460-483. Springer, (2023)Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT., , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 117-150. Springer, (2019)Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!, , , , , , , and . AISec@CCS, page 169-180. ACM, (2021)