Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Token meets Wallet: Formalizing Privacy and Revocation for FIDO2., , and . SP, page 1491-1508. IEEE, (2023)Short Identity-Based Signatures with Tight Security from Lattices., and . PQCrypto, volume 12841 of Lecture Notes in Computer Science, page 360-379. Springer, (2021)Toothpicks: More Efficient Fork-Free Two-Round Multi-signatures., and . EUROCRYPT (1), volume 14651 of Lecture Notes in Computer Science, page 460-489. Springer, (2024)A Holistic Security Analysis of Monero Transactions., , and . EUROCRYPT (3), volume 14653 of Lecture Notes in Computer Science, page 129-159. Springer, (2024)A Documentation of Ethereum's PeerDAS., and . IACR Cryptol. ePrint Arch., (2024)A Holistic Security Analysis of Monero Transactions., , and . IACR Cryptol. ePrint Arch., (2023)Lattice-Based Signatures with Tight Adaptive Corruptions and More., and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 347-378. Springer, (2022)Twinkle: Threshold Signatures from DDH with Full Adaptive Security., , , , and . EUROCRYPT (1), volume 14651 of Lecture Notes in Computer Science, page 429-459. Springer, (2024)FIDO2 With Two Displays - Or How to Protect Security-Critical Web Transactions Against Malware Attacks., , , , , , and . CoRR, (2022)A historical perspective of explainable Artificial Intelligence., , , and . WIREs Data Mining Knowl. Discov., (2021)