Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries., and . CoRR, (2014)Digital Signatures from Strong RSA without Prime Generation., , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 217-235. Springer, (2015)Standard Security Does Not Imply Security against Selective-Opening., , , and . EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, page 645-662. Springer, (2012)Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain., , , , , , , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 25-45. Springer, (2022)A Two-Party Protocol with Trusted Initializer for Computing the Inner Product., , , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 337-350. Springer, (2010)Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption., , , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 299-306. Springer, (2010)On the Commitment Capacity of Unfair Noisy Channels., , and . CoRR, (2019)21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State., , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 45-63. Springer, (2018)Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement., , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 500-519. Springer, (2018)How Secure is Deterministic Encryption?, , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 52-73. Springer, (2015)