Author of the publication

Can We Securely Use CBC Mode in TLS1.0?

, , and . ICT-EurAsia/CONFENIS, volume 9357 of Lecture Notes in Computer Science, page 151-160. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can We Securely Use CBC Mode in TLS1.0?, , and . ICT-EurAsia/CONFENIS, volume 9357 of Lecture Notes in Computer Science, page 151-160. Springer, (2015)Generic Fully Simulatable Adaptive Oblivious Transfer., , and . ACNS, volume 6715 of Lecture Notes in Computer Science, page 274-291. (2011)Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 189-194 (2005)A Storage Efficient Redactable Signature in the Standard Model., , , and . ISC, volume 5735 of Lecture Notes in Computer Science, page 326-337. Springer, (2009)Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing., , , , , and . CoRR, (2016)Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions., , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 235-246. Springer, (2012)Simple Adaptive Oblivious Transfer without Random Oracle., and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 334-346. Springer, (2009)Membership Privacy for Asynchronous Group Messaging., , , , and . WISA, volume 13720 of Lecture Notes in Computer Science, page 131-142. Springer, (2022)Cryptographically Secure Bloom-Filters., and . Trans. Data Priv., 2 (2): 131-139 (2009)Designing a Location Trace Anonymization Contest., , , , , , , , , and 6 other author(s). CoRR, (2021)