Author of the publication

Nonces Are Noticed: AEAD Revisited.

, , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 235-265. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Per-session security: Password-based cryptography revisited., , , and . J. Comput. Secur., 27 (1): 75-111 (2019)Anonymity-preserving Public-Key Encryption: A Constructive Approach., , , , and . IACR Cryptol. ePrint Arch., (2013)Synchrony amplification., and . ISIT, page 1583-1587. IEEE, (2012)The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3., and . CRYPTO (1), volume 9814 of Lecture Notes in Computer Science, page 247-276. Springer, (2016)Toward an algebraic theory of systems., , , , and . Theor. Comput. Sci., (2018)Robust Authenticated Encryption and the Limits of Symmetric Cryptography., , , , and . IMACC, volume 9496 of Lecture Notes in Computer Science, page 112-129. Springer, (2015)Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC., , , , and . TCC (3), volume 12552 of Lecture Notes in Computer Science, page 1-30. Springer, (2020)Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric., , , and . CANS, volume 13099 of Lecture Notes in Computer Science, page 435-459. Springer, (2021)A Constructive Perspective on Key Encapsulation., , and . Number Theory and Cryptography, volume 8260 of Lecture Notes in Computer Science, page 226-239. Springer, (2013)Nonces Are Noticed: AEAD Revisited., , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 235-265. Springer, (2019)