Author of the publication

Security of Even-Mansour Ciphers under Key-Dependent Messages.

, , and . IACR Trans. Symmetric Cryptol., 2017 (2): 84-104 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes., , and . IMACC, volume 7089 of Lecture Notes in Computer Science, page 431-450. Springer, (2011)Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys., and . Public Key Cryptography, volume 5443 of Lecture Notes in Computer Science, page 235-255. Springer, (2009)Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption., and . Public Key Cryptography, volume 4939 of Lecture Notes in Computer Science, page 360-379. Springer, (2008)Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk).. WISTP, volume 11469 of Lecture Notes in Computer Science, page 7-11. Springer, (2018)Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map., and . SCN, volume 3352 of Lecture Notes in Computer Science, page 105-119. Springer, (2004)On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption., , , , and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 1-18. (2010)Multi-designated Verifiers Signatures., and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 495-507. Springer, (2004)Short Undeniable Signatures Without Random Oracles: The Missing Link., and . INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, page 283-296. Springer, (2005)Secure storage - Confidentiality and authentication., , and . Comput. Sci. Rev., (2022)Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption., and . IEEE Trans. Inf. Theory, 57 (3): 1786-1802 (2011)