Author of the publication

Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework.

, , , and . CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 335-351. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing wireless sensor networks against aggregator compromises., , , and . IEEE Communications Magazine, 46 (4): 134-141 (2008)Lattice-Based Hierarchical Inner Product Encryption., , and . LATINCRYPT, volume 7533 of Lecture Notes in Computer Science, page 121-138. Springer, (2012)Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework., , , and . CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 335-351. Springer, (2008)The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES., , and . CT-RSA, volume 2020 of Lecture Notes in Computer Science, page 143-158. Springer, (2001)Contributory Password-Authenticated Group Key Exchange with Join Capability., , , and . CT-RSA, volume 6558 of Lecture Notes in Computer Science, page 142-160. Springer, (2011)Forward-Secure Threshold Signature Schemes., , and . CT-RSA, volume 2020 of Lecture Notes in Computer Science, page 441-456. Springer, (2001)Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange., , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 133-148. Springer, (2008)Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings., , , , and . IACR Cryptol. ePrint Arch., (2017)Security Characterization of J-PAKE and its Variants., , , , and . IACR Cryptol. ePrint Arch., (2021)Tighter Reductions for Forward-Secure Signature Schemes., , and . Public Key Cryptography, volume 7778 of Lecture Notes in Computer Science, page 292-311. Springer, (2013)