Author of the publication

Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology.

, , and . TCC, volume 2951 of Lecture Notes in Computer Science, page 21-39. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized privacy amplification., , , and . IEEE Trans. Inf. Theory, 41 (6): 1915-1923 (1995)Abstract Models of Computation in Cryptography.. IMACC, volume 3796 of Lecture Notes in Computer Science, page 1-12. Springer, (2005)New Approaches to Digital Evidence.. Proc. IEEE, 92 (6): 933-947 (2004)Abstract Storage Devices, , and . CoRR, (2007)Intrinsic Limitations of Digital Signatures and How to Cope with Them.. ISC, volume 2851 of Lecture Notes in Computer Science, page 180-192. Springer, (2003)Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology., , and . TCC, volume 2951 of Lecture Notes in Computer Science, page 21-39. Springer, (2004)On the Efficiency of One-Time Digital Signatures., and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 145-158. Springer, (1996)Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations., and . ASIACRYPT, volume 4833 of Lecture Notes in Computer Science, page 427-443. Springer, (2007)Linking Information Reconciliation and Privacy Amplification (Extended Abstract)., and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 266-274. Springer, (1994)Robustness for Free in Unconditional Multi-party Computation., and . CRYPTO, volume 2139 of Lecture Notes in Computer Science, page 101-118. Springer, (2001)