Author of the publication

Robust Encryption, Revisited.

, , , and . Public Key Cryptography, volume 7778 of Lecture Notes in Computer Science, page 352-368. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacks Against GSMA's M2M Remote Provisioning (Short Paper)., , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 243-252. Springer, (2018)Anonymous Broadcast Encryption., , and . IACR Cryptology ePrint Archive, (2011)An Overview of GSMA's M2M Remote Provisioning Specification., , and . CoRR, (2019)Dynamic Multi-server Updatable Encryption., and . ISC, volume 14411 of Lecture Notes in Computer Science, page 475-495. Springer, (2023)TIDE: A Novel Approach to Constructing Timed-Release Encryption., , , and . ACISP, volume 13494 of Lecture Notes in Computer Science, page 244-264. Springer, (2022)SoK: Anonymous Credentials., , , and . SSR, volume 13895 of Lecture Notes in Computer Science, page 129-151. Springer, (2023)Robust Encryption, Revisited., , , and . Public Key Cryptography, volume 7778 of Lecture Notes in Computer Science, page 352-368. Springer, (2013)Applications of Timed-Release Encryption with Implicit Authentication., , , and . AFRICACRYPT, volume 14064 of Lecture Notes in Computer Science, page 490-515. Springer, (2023)CLUE: Certificateless Updatable Encryption., and . ITASEC, volume 3488 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Anonymity and Rewards in Peer Rating Systems., , , and . SCN, volume 12238 of Lecture Notes in Computer Science, page 277-297. Springer, (2020)