Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benchmarking Post-Quantum Cryptography in TLS., , and . IACR Cryptology ePrint Archive, (2019)The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols., and . PQCrypto, volume 12841 of Lecture Notes in Computer Science, page 154-173. Springer, (2021)Proof-of-Possession for KEM Certificates using Verifiable Generation., , , , , and . CCS, page 1337-1351. ACM, (2022)Efficient Oblivious Database Joins., , and . CoRR, (2020)Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements., , and . ESORICS (1), volume 14344 of Lecture Notes in Computer Science, page 168-188. Springer, (2023)SoK: Game-Based Security Models for Group Key Exchange., , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 148-176. Springer, (2021)Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake., , , , and . IACR Cryptol. ePrint Arch., (2021)Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation., and . PQCrypto, volume 14154 of Lecture Notes in Computer Science, page 535-564. Springer, (2023)A reduction-based proof for authentication and session key security in three-party Kerberos., and . Int. J. Appl. Cryptogr., 4 (2): 61-84 (2022)Integrating elliptic curve cryptography into the web's security infrastructure., , and . WWW (Alternate Track Papers & Posters), page 402-403. ACM, (2004)