Author of the publication

Analyzing and Fixing the QACCE Security of QUIC.

, , , and . SSR, volume 10074 of Lecture Notes in Computer Science, page 1-31. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimum General Threshold Secret Sharing., , and . ICITS, volume 7412 of Lecture Notes in Computer Science, page 187-204. Springer, (2012)Verifiably Multiplicative Secret Sharing., and . ICITS, volume 10681 of Lecture Notes in Computer Science, page 73-82. Springer, (2017)An Efficient Construction of Non-Interactive Secure Multiparty Computation., and . CANS, volume 10052 of Lecture Notes in Computer Science, page 604-614. (2016)Verifiably Multiplicative Secret Sharing., and . IEEE Trans. Inf. Theory, 65 (5): 3233-3245 (2019)On Cryptographic Algorithms and Key Length for Delayed Disclosure Authentication of GNSS., , and . ICL-GNSS, page 1-6. IEEE, (2022)Hybrid Multiplicative Secret Sharing.. ITW, page 1-5. IEEE, (2021)Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval., , and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 387-402. Springer, (2008)Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing., and . ICETE (2), page 322-329. ScitePress, (2020)Analyzing and Fixing the QACCE Security of QUIC., , , and . SSR, volume 10074 of Lecture Notes in Computer Science, page 1-31. Springer, (2016)On the Communication Complexity of Private Function Sharing and Computation.. ISIT, page 258-263. IEEE, (2023)