Author of the publication

Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices.

, and . CHES, volume 10529 of Lecture Notes in Computer Science, page 346-364. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: SCA-secure ECC in software - mission impossible?, , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (1): 557-589 (2023)SCA-secure ECC in software - mission impossible?, , , , and . IACR Cryptol. ePrint Arch., (2021)Security Analysis of CPace., , and . ASIACRYPT (4), volume 13093 of Lecture Notes in Computer Science, page 711-741. Springer, (2021)AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT., and . IACR Cryptology ePrint Archive, (2018)AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT., and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (2): 1-48 (2019)Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices., and . CHES, volume 10529 of Lecture Notes in Computer Science, page 346-364. Springer, (2017)