Author of the publication

Impossibility and Feasibility Results for Zero Knowledge with Public Keys.

, , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 135-151. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiently Computing Data-Independent Memory-Hard Functions., and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 241-271. Springer, (2016)Server-Aided Continuous Group Key Agreement., , , and . IACR Cryptol. ePrint Arch., (2021)Collusion Preserving Computation.. New York University, USA, (2011)Modular Design of Secure Group Messaging Protocols and the Security of MLS., , , and . CCS, page 1463-1483. ACM, (2021)Anonymous Authentication with Shared Secrets., , , , and . LATINCRYPT, volume 8895 of Lecture Notes in Computer Science, page 219-236. Springer, (2014)Analysing the HPKE Standard., , , , , and . EUROCRYPT (1), volume 12696 of Lecture Notes in Computer Science, page 87-116. Springer, (2021)Towards Practical Attacks on Argon2i and Balloon Hashing., and . EuroS&P, page 142-157. IEEE, (2017)DeCAF: Decentralizable CGKA with Fast Healing., , , , , and . SCN (2), volume 14974 of Lecture Notes in Computer Science, page 294-313. Springer, (2024)Analysing the HPKE Standard - Supplementary Material., , , , , and . (September 2021)Analysing the HPKE Standard - Supplementary Material., , , , , and . (November 2020)