Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The low-call diet: Authenticated Encryption for call counting HSM users., , , and . IACR Cryptology ePrint Archive, (2012)An Algebraic Approach to NTRU (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear Equations., , and . SCN, volume 3352 of Lecture Notes in Computer Science, page 278-293. Springer, (2004)Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries.. CT-RSA, volume 5985 of Lecture Notes in Computer Science, page 15-25. Springer, (2010)Modes of Operation Suitable for Computing on Encrypted Data., , and . IACR Trans. Symmetric Cryptol., 2017 (3): 294-324 (2017)Thresholdizing HashEdDSA: MPC to the Rescue., , and . IACR Cryptology ePrint Archive, (2020)Hash Based Digital Signature Schemes., , and . IMACC, volume 3796 of Lecture Notes in Computer Science, page 96-115. Springer, (2005)A Cryptographic Application of Weil Descent., and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 191-200. Springer, (1999)Building a Community of Real-World Cryptographers., , and . IEEE Secur. Priv., 14 (6): 7-9 (2016)Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol., and . PQCrypto, volume 12100 of Lecture Notes in Computer Science, page 169-186. Springer, (2020)An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction., , , and . IACR Cryptol. ePrint Arch., (2005)