Author of the publication

Breaking and Repairing an Approximate Message Authentication Scheme.

, , and . Discret. Math. Algorithms Appl., 3 (3): 393-412 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme., and . Communications and Multimedia Security, volume 152 of IFIP Conference Proceedings, page 273-290. Kluwer, (1999)Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security., , and . Int. J. Inf. Sec., 5 (4): 241-255 (2006)A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases., , , and . Australasian Database Conference, volume 17 of Australian Computer Science Communications, (1995)Three Systems for Threshold Generation of Authenticators.. Des. Codes Cryptogr., 13 (3): 299-312 (1998)General Group Authentication Codes and Their Relation to Ünconditionally-Secure Signatures"., , and . Public Key Cryptography, volume 2947 of Lecture Notes in Computer Science, page 231-247. Springer, (2004)Breaking and Repairing an Approximate Message Authentication Scheme., , and . Discret. Math. Algorithms Appl., 3 (3): 393-412 (2011)K2SN-MSS: An Efficient Post-Quantum Signature., and . AsiaCCS, page 501-514. ACM, (2019)Non-interactive conference key distribution and its applications., and . AsiaCCS, page 271-282. ACM, (2008)Performance Analysis of Linux RNG in Virtualized Environments., , and . CCSW, page 29-39. ACM, (2015)Verifiable local computation on distributed data., , and . SCC@ASIACCS, page 3-10. ACM, (2014)