Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Entropy in Quantum Information Theory - Communication and Cryptography.. CoRR, (2018)Tight Adaptive Reprogramming in the QROM., , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 637-667. Springer, (2021)Post-Quantum Security of the Even-Mansour Cipher., , , and . EUROCRYPT (3), volume 13277 of Lecture Notes in Computer Science, page 458-487. Springer, (2022)Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM., , , and . CRYPTO (2), volume 13508 of Lecture Notes in Computer Science, page 729-757. Springer, (2022)Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability., , , and . CoRR, (2019)Secure Multi-party Quantum Computation with a Dishonest Majority., , , , and . IACR Cryptology ePrint Archive, (2019)Can you sign a quantum state?, , and . Quantum, (2021)SDitH in the QROM., , , , , and . ASIACRYPT (7), volume 14444 of Lecture Notes in Computer Science, page 317-350. Springer, (2023)Quantum non-malleability and authentication., and . CoRR, (2016)Tight adaptive reprogramming in the QROM., , , and . IACR Cryptol. ePrint Arch., (2020)