Author of the publication

Parallel Verification of Serial MAC and AE Modes.

, , , , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 200-219. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Verification of Serial MAC and AE Modes., , , , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 200-219. Springer, (2021)Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 67-84. Springer, (2022)SoK: Pseudorandom Generation for Masked Cryptographic Implementation., , , and . IACR Cryptol. ePrint Arch., (2024)Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure., , , , and . CCS, page 228-242. ACM, (2024)Generic Security of GCM-SST., , , and . ACNS (2), volume 15826 of Lecture Notes in Computer Science, page 342-369. Springer, (2025)Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality., , , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 3-31. Springer, (2019)ELM: A Low-Latency and Scalable Memory Encryption Scheme., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Comprehensive Robustness Analysis of GCM, CCM, and OCB3., , and . CT-RSA, volume 15598 of Lecture Notes in Computer Science, page 75-98. Springer, (2025)Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain., and . SmartIoT, page 314-318. IEEE, (2020)Parallelizable Authenticated Encryption with Small State Size., and . SAC, volume 11959 of Lecture Notes in Computer Science, page 618-644. Springer, (2019)