Author of the publication

Fighting Pirates 2.0.

, and . ACNS, volume 6715 of Lecture Notes in Computer Science, page 359-376. (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols., , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1336-1353 (2021)Cryptanalysis of a key exchange scheme based on block matrices., , and . IACR Cryptol. ePrint Arch., (2009)Group Key Establishment in a Quantum-Future Scenario., , and . Informatica, 31 (4): 751-768 (2020)Fighting Pirates 2.0., and . ACNS, volume 6715 of Lecture Notes in Computer Science, page 359-376. (2011)Pitfalls in a server-aided authenticated group key establishment., , and . Inf. Sci., (2016)An Attack on Zawadzki's Quantum Authentication Scheme., , , and . Entropy, 23 (4): 389 (2021)Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions., and . IACR Cryptol. ePrint Arch., (2009)Size-Hiding in Private Set Intersection: Existential Results and Constructions., , , and . AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 378-394. Springer, (2012)Toward tracing and revoking schemes secure against collusion and any form of secret information leakage., and . Int. J. Inf. Sec., 12 (1): 1-17 (2013)A note on the security of MST3., , and . Des. Codes Cryptogr., 55 (2-3): 189-200 (2010)