Author of the publication

Collaborative Information Service - Privacy Algebra for User Defined Security.

, , and . ICISSP, page 473-481. SciTePress, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover's Attacks., , , , and . INDOCRYPT, volume 13143 of Lecture Notes in Computer Science, page 179-198. Springer, (2021)A Note on Four-State BB84 Protocol., and . IACR Cryptology ePrint Archive, (2011)Efficient quantum algorithms to construct arbitrary Dicke states., , , and . Quantum Inf. Process., 13 (9): 2049-2069 (2014)Grover on Chosen IV Related Key Attack Against GRAIN-128a., , , , , and . INDOCRYPT (1), volume 14459 of Lecture Notes in Computer Science, page 287-306. Springer, (2023)Device Independent Quantum Key Distribution Using Three-Party Pseudo-Telepathy., , and . INDOCRYPT, volume 11898 of Lecture Notes in Computer Science, page 456-471. Springer, (2019)Generalized Approach for Analysing Quantum Key Distribution Experiments., and . INDOCRYPT, volume 11898 of Lecture Notes in Computer Science, page 472-491. Springer, (2019)Revisiting BoolTest - On Randomness Testing Using Boolean Functions., , , , and . INDOCRYPT, volume 13774 of Lecture Notes in Computer Science, page 471-491. Springer, (2022)Efficient quantum algorithm to construct arbitrary Dicke states, , , and . CoRR, (2012)Dimensionality Distinguishers., , and . CoRR, (2019)Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84., and . INDOCRYPT, volume 7668 of Lecture Notes in Computer Science, page 80-99. Springer, (2012)