Author of the publication

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM.

, , , , and . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating more MNT elliptic curves., and . IACR Cryptology ePrint Archive, (2004)Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs., , , , and . IACR Cryptology ePrint Archive, (2015)DAGS: Key Encapsulation using Dyadic GS Codes., , , , , , , , , and 3 other author(s). IACR Cryptology ePrint Archive, (2017)A class of safe and efficient binary Edwards curves., , and . J. Cryptogr. Eng., 8 (4): 271-283 (2018)The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme., , , , and . Secur. Commun. Networks, 2 (2): 165-180 (2009)Blind signatures from Zero-knowledge arguments., and . IACR Cryptol. ePrint Arch., (2023)Signcryption Schemes Based on the Diffie-Hellman Problem., , , and . Practical Signcryption, Springer, (2010)qSCMS: Post-quantum certificate provisioning process for V2X., , , and . IACR Cryptology ePrint Archive, (2018)Revisiting the Security of the Alred Design., , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 69-83. Springer, (2010)On the Selection of Pairing-Friendly Groups., , and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 17-25. Springer, (2003)