Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward RSA-OAEP Without Random Oracles., , and . Public Key Cryptography (1), volume 12110 of Lecture Notes in Computer Science, page 279-308. Springer, (2020)Leakage Resilience from Program Obfuscation., , , , and . J. Cryptol., 32 (3): 742-824 (2019)Forward Security Under Leakage Resilience, Revisited., , , and . CANS, volume 14342 of Lecture Notes in Computer Science, page 3-27. Springer, (2023)Approximate Distance-Comparison-Preserving Symmetric Encryption., , , and . SCN, volume 13409 of Lecture Notes in Computer Science, page 117-144. Springer, (2022)Breaking RSA Generically is Equivalent to Factoring, with Preprocessing., , , and . IACR Cryptol. ePrint Arch., (2022)Ad Hoc Multi-Input Functional Encryption., , , , , and . IACR Cryptol. ePrint Arch., (2019)On Selective-Opening Security of Deterministic Primitives., and . IACR Cryptology ePrint Archive, (2020)εpsolute: Efficiently Querying Databases While Providing Differential Privacy., , , , and . CCS, page 2262-2276. ACM, (2021)Towards RSA-OAEP without Random Oracles., , and . IACR Cryptology ePrint Archive, (2018)Forward-Security Under Continual Leakage with Deterministic Key Updates., , , and . IACR Cryptol. ePrint Arch., (2020)