Author of the publication

Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters.

, , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation., and . IACR Cryptology ePrint Archive, (2015)On Statistically Secure Obfuscation with Approximate Correctness., , and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 551-578. Springer, (2016)Downgrade Resilience in Key-Exchange Protocols., , , , , and . IEEE Symposium on Security and Privacy, page 506-525. IEEE Computer Society, (2016)Using Indistinguishability Obfuscation via UCEs., and . ASIACRYPT (2), volume 8874 of Lecture Notes in Computer Science, page 122-141. Springer, (2014)Arithmetic Cryptography., , and . Electron. Colloquium Comput. Complex., (2015)TLS, PACE, and EAC: ACryptographic View at Modern Key Exchange Protocols., , and . Sicherheit, volume P-195 of LNI, page 71-82. GI, (2012)Random Oracle Uninstantiability from Indistinguishability Obfuscation., , and . IACR Cryptology ePrint Archive, (2014)Arithmetic Cryptography: Extended Abstract., , and . ITCS, page 143-151. ACM, (2015)Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources., , and . CRYPTO (1), volume 8616 of Lecture Notes in Computer Science, page 188-205. Springer, (2014)Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input., and . ASIACRYPT (2), volume 8874 of Lecture Notes in Computer Science, page 142-161. Springer, (2014)