Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple forgery attacks against Message Authentication Codes., and . IACR Cryptology ePrint Archive, (2005)Galois Counter Mode.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security., and . Selected Areas in Cryptography, volume 2012 of Lecture Notes in Computer Science, page 14-28. Springer, (2000)The Security and Performance of the Galois/Counter Mode (GCM) of Operation., and . INDOCRYPT, volume 3348 of Lecture Notes in Computer Science, page 343-355. Springer, (2004)The Security of the Extended Codebook (XCB) Mode of Operation., and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 311-327. Springer, (2007)High speed architectures for Leviathan: a binary tree based stream cipher., , , and . Microprocess. Microsystems, 28 (10): 573-584 (2004)Assessing and Exploiting Domain Name Misinformation., and . EuroS&P Workshops, page 475-486. IEEE, (2023)State Management for Hash-Based Signatures., , , , , and . SSR, volume 10074 of Lecture Notes in Computer Science, page 244-260. Springer, (2016)The Security and Performance of the Galois/Counter Mode of Operation (Full Version)., and . IACR Cryptology ePrint Archive, (2004)Identifying Encrypted Malware Traffic with Contextual Flow Data., and . AISec@CCS, page 35-46. ACM, (2016)