Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Updatable Oblivious Key Management for Storage Systems., , and . ACM Conference on Computer and Communications Security, page 379-393. ACM, (2019)Simple forward-secure signatures from any signature scheme.. ACM Conference on Computer and Communications Security, page 108-115. ACM, (2000)On the Cryptographic Deniability of the Signal Protocol., , , and . ACNS (2), volume 12147 of Lecture Notes in Computer Science, page 188-209. Springer, (2020)Pseudorandomness and computational difficulty.. Technion - Israel Institute of Technology, Israel, (1990)On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding., , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 380-409. Springer, (2021)LFSR-based Hashing and Authentication.. CRYPTO, volume 839 of Lecture Notes in Computer Science, page 129-139. Springer, (1994)Cryptographic Extraction and Key Derivation: The HKDF Scheme.. CRYPTO, volume 6223 of Lecture Notes in Computer Science, page 631-648. Springer, (2010)The Shrinking Generator., , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 22-39. Springer, (1993)The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?).. CRYPTO, volume 2139 of Lecture Notes in Computer Science, page 310-331. Springer, (2001)Secret Sharing Made Short.. CRYPTO, volume 773 of Lecture Notes in Computer Science, page 136-146. Springer, (1993)