Author of the publication

Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption.

. ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 630-661. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the collision and preimage security of MDC-4 in the ideal cipher model.. Des. Codes Cryptogr., 73 (1): 121-150 (2014)Connecting tweakable and multi-key blockcipher security., , , and . Des. Codes Cryptogr., 86 (3): 623-640 (2018)Secure Distributed Modular Exponentiation: Systematic Analysis and New Results.. IEEE Trans. Inf. Forensics Secur., (2023)Efficient Instances of Docked Double Decker With AES., , , and . IACR Cryptol. ePrint Arch., (2024)Isap v2.0., , , , , , and . IACR Trans. Symmetric Cryptol., 2020 (S1): 390-416 (2020)Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE., , , , , , and . IACR Trans. Symmetric Cryptol., 2019 (4): 119-146 (2019)Tight Preimage Resistance of the Sponge Construction., and . CRYPTO (4), volume 13510 of Lecture Notes in Computer Science, page 185-204. Springer, (2022)Categorization of Faulty Nonce Misuse Resistant Message Authentication., , and . ASIACRYPT (3), volume 13092 of Lecture Notes in Computer Science, page 520-550. Springer, (2021)Leakage Resilience of the Duplex Construction., and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 225-255. Springer, (2019)Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model., , and . IACR Trans. Symmetric Cryptol., 2019 (4): 1-22 (2019)