Author of the publication

SeCon-NG: implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in contiki-NG.

, and . SAC, page 767-769. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption., , , , and . CoRR, (2024)Footsteps in the fog: Certificateless fog-based access control., , and . Comput. Secur., (2022)A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud., , , , , , and . Ann. des Télécommunications, 75 (3-4): 103-119 (2020)Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices., , , and . IoTBDS, page 119-129. SCITEPRESS, (2020)Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version)., , and . IACR Cryptol. ePrint Arch., (2022)Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors., , , and . DBSec, volume 13383 of Lecture Notes in Computer Science, page 279-299. Springer, (2022)Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version)., , , and . IACR Cryptology ePrint Archive, (2020)Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices., , , and . IACR Cryptol. ePrint Arch., (2024)Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)?, , , and . IACR Cryptol. ePrint Arch., (2022)A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation., , , and . PerCom Workshops, page 640-645. IEEE, (2023)