Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximating Cumulative Pebbling Cost is Unique Games Hard., , and . CoRR, (2019)An Economic Model for Quantum Key-Recovery Attacks against Ideal Ciphers., and . CoRR, (2020)Resolving the Complexity of Some Data Privacy Problems., and . ICALP (2), volume 6199 of Lecture Notes in Computer Science, page 393-404. Springer, (2010)Naturally Rehearsing Passwords., , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 361-380. Springer, (2013)On the Multi-User Security of Short Schnorr Signatures., and . IACR Cryptology ePrint Archive, (2019)On Explicit Constructions of Extremely Depth Robust Graphs., , , and . CoRR, (2021)On the Security of Proofs of Sequential Work in a Post-Quantum World., , and . ITC, volume 199 of LIPIcs, page 22:1-22:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Client-CASH: Protecting Master Passwords against Offline Attacks., and . AsiaCCS, page 165-176. ACM, (2016)Private and Resource-Bounded Locally Decodable Codes for Insertions and Deletions., and . ISIT, page 1841-1846. IEEE, (2021)CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection., and . CSF, page 371-386. IEEE Computer Society, (2016)