Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tight adaptive reprogramming in the QROM., , , and . IACR Cryptol. ePrint Arch., (2020)The security of Kyber's FO-transform., and . IACR Cryptol. ePrint Arch., (2023)Quantum Indistinguishability of Random Sponges., , and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 296-325. Springer, (2019)Report on evaluation of KpqC candidates., , , , , , , , , and . IACR Cryptol. ePrint Arch., (2023)The Return of the SDitH., , , , , and . IACR Cryptol. ePrint Arch., (2022)Rapidly Verifiable XMSS Signatures., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (1): 137-168 (2021)Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model., , , , and . IACR Cryptol. ePrint Arch., (2023)Recovering the Tight Security Proof of SPHINCS+., and . ASIACRYPT (4), volume 13794 of Lecture Notes in Computer Science, page 3-33. Springer, (2022)Tight Adaptive Reprogramming in the QROM., , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 637-667. Springer, (2021)Epochal Signatures for Deniable Group Chats., and . IACR Cryptol. ePrint Arch., (2020)