Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Authentication with Shared Secrets., , , , and . LATINCRYPT, volume 8895 of Lecture Notes in Computer Science, page 219-236. Springer, (2014)Security Analysis and Improvements for the IETF MLS Standard for Group Messaging., , , and . IACR Cryptology ePrint Archive, (2019)Grafting Key Trees: Efficient Key Management for Overlapping Groups., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)Towards Practical Attacks on Argon2i and Balloon Hashing., and . EuroS&P, page 142-157. IEEE, (2017)Modular Design of Secure Group Messaging Protocols and the Security of MLS., , , and . CCS, page 1463-1483. ACM, (2021)Analysing the HPKE Standard., , , , , and . EUROCRYPT (1), volume 12696 of Lecture Notes in Computer Science, page 87-116. Springer, (2021)Efficiently Computing Data-Independent Memory-Hard Functions., and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 241-271. Springer, (2016)Generating Shorter Bases for Hard Random Lattices., and . Theory Comput. Syst., 48 (3): 535-553 (2011)Coffee: Fast Healing Concurrent Continuous Group Key Agreement for Decentralized Group Messaging., , , , , and . IACR Cryptol. ePrint Arch., (2022)Server-Aided Continuous Group Key Agreement., , , and . IACR Cryptol. ePrint Arch., (2021)