Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation., and . ASIACRYPT (2), volume 13091 of Lecture Notes in Computer Science, page 275-304. Springer, (2021)How to Build Pseudorandom Functions from Public Random Permutations., , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 266-293. Springer, (2019)Multi-user Security of the Elephant v2 Authenticated Encryption Mode., , , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 155-178. Springer, (2021)Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus., , , and . IACR Trans. Symmetric Cryptol., 2020 (S1): 5-30 (2020)Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation., and . IACR Cryptol. ePrint Arch., (2022)Systematic Security Analysis of Stream Encryption With Key Erasure., , , and . IEEE Trans. Inf. Theory, 67 (11): 7518-7534 (2021)A Modular Approach to the Security Analysis of Two-Permutation Constructions.. ASIACRYPT (1), volume 13791 of Lecture Notes in Computer Science, page 379-409. Springer, (2022)Multi-User BBB Security of Public Permutations Based MAC., , and . IACR Cryptol. ePrint Arch., (2022)Key Committing Security of AEZ and More., , , , , , , , , and . IACR Trans. Symmetric Cryptol., 2023 (4): 452-488 (2023)Categorization of Faulty Nonce Misuse Resistant Message Authentication., , and . ASIACRYPT (3), volume 13092 of Lecture Notes in Computer Science, page 520-550. Springer, (2021)