Author of the publication

Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy.

, , , and . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An analysis of the EMV channel establishment protocol., , , and . ACM Conference on Computer and Communications Security, page 373-386. ACM, (2013)Efficient Network Coding Signatures in the Standard Model., , and . Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 680-696. Springer, (2012)Secure Software Licensing: Models, Constructions, and Proofs., and . CSF, page 31-44. IEEE Computer Society, (2016)Identity Based Group Signatures from Hierarchical Identity-Based Encryption., and . Pairing, volume 5671 of Lecture Notes in Computer Science, page 150-170. Springer, (2009)Computationally Sound Symbolic Secrecy in the Presence of Hash Functions., , , and . FSTTCS, volume 4337 of Lecture Notes in Computer Science, page 176-187. Springer, (2006)Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality., , , and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 127-148. Springer, (2019)Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols., , , , and . IACR Cryptol. ePrint Arch., (2024)On Limitations of the Fiat­ - Shamir Transformation., and . IACR Cryptology ePrint Archive, (2015)Security analysis of cryptographically controlled access to XML documents., and . J. ACM, 55 (2): 6:1-6:29 (2008)Provably-Secure Remote Memory Attestation for Heap Overflow Protection., , , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 83-103. Springer, (2016)