Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security bound for CTR-ACPKM internally re-keyed encryption mode., , and . IACR Cryptology ePrint Archive, (2018)On the (im)possibility of ElGamal blind signatures., , , and . IACR Cryptol. ePrint Arch., (2022)Continuing to reflect on TLS 1.3 with external PSK., , , and . IACR Cryptology ePrint Archive, (2019)On methods of shortening ElGamal-type signatures., , , and . IACR Cryptol. ePrint Arch., (2021)Security of Multilinear Galois Mode (MGM)., , , and . IACR Cryptology ePrint Archive, (2019)On Internal Re-keying., , , and . SSR, volume 12529 of Lecture Notes in Computer Science, page 23-45. Springer, (2020)On Cryptographic Properties of the NB-Fi Protocol., , , , and . Autom. Control. Comput. Sci., 55 (8): 1180-1187 (2021)Misuse-resistant MGM2 mode., , , , and . IACR Cryptol. ePrint Arch., (2022)On post-handshake authentication and external PSKs in TLS 1.3., , , and . J. Comput. Virol. Hacking Tech., 16 (4): 269-274 (2020)Security Analysis for Randomness Improvements for Security Protocols., , , and . IACR Cryptology ePrint Archive, (2018)