Author of the publication

A Framework for Universally Composable Diffie-Hellman Key Exchange.

, and . IEEE Symposium on Security and Privacy, page 881-900. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Formal Definition of Online Abuse-Freeness., , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 484-497. Springer, (2010)Extensions to Description Logics., , and . Description Logic Handbook, Cambridge University Press, (2003)On the Relationships Between Notions of Simulation-Based Security., , , and . IACR Cryptology ePrint Archive, (2006)iUC: Flexible Universal Composability Made Simple., , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 191-221. Springer, (2019)A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols., , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 422-437. Springer, (2007)Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach., and . ACM Conference on Computer and Communications Security, page 129-138. ACM, (2008)The IITM Model: A Simple and Expressive Model for Universal Composability., , and . J. Cryptol., 33 (4): 1461-1584 (2020)Joint State Composition Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation., , and . J. Cryptol., 33 (4): 1585-1658 (2020)Convolutions in Overdrive: Maliciously Secure Convolutions for MPC., , , and . IACR Cryptol. ePrint Arch., (2023)PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party Computation., , , , , and . CoRR, (2024)