Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of NIST CTR-DRBG., and . CRYPTO (1), volume 12170 of Lecture Notes in Computer Science, page 218-247. Springer, (2020)Adaptive Witness Encryption and Asymmetric Password-Based Cryptography., and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 308-331. Springer, (2015)The Multi-user Security of Double Encryption., and . EUROCRYPT (2), volume 10211 of Lecture Notes in Computer Science, page 381-411. (2017)Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds., , and . EUROCRYPT (1), volume 10820 of Lecture Notes in Computer Science, page 468-499. Springer, (2018)Instantiating Random Oracles via UCEs., , and . CRYPTO (2), volume 8043 of Lecture Notes in Computer Science, page 398-415. Springer, (2013)Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance., , , and . CRYPTO (1), volume 9215 of Lecture Notes in Computer Science, page 493-517. Springer, (2015)Message-Recovery Attacks on Feistel-Based Format Preserving Encryption., , and . ACM Conference on Computer and Communications Security, page 444-455. ACM, (2016)CryptMPI: A Fast Encrypted MPI Library., , , , , , and . CoRR, (2020)Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model., and . EUROCRYPT (2), volume 9057 of Lecture Notes in Computer Science, page 627-656. Springer, (2015)Efficient Algorithms for Encrypted All-gather Operation., , , , , , and . IPDPS, page 372-381. IEEE, (2021)