Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fujisaki-Okamoto IND-CCA hybrid encryption revisited., , , and . IACR Cryptology ePrint Archive, (2003)Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems.. Public Key Cryptography (1), volume 10174 of Lecture Notes in Computer Science, page 435-464. Springer, (2017)An IND-CPA cryptosystem from Demytko's primitive., , , and . ITW, page 167-170. IEEE, (2003)A new Cramer-Shoup like methodology for group based provably secure schemes, , , and . Proceedings of the 2nd Theory of Cryptography Conference TCC 2005, volume 3378 of Lecture Notes in Computer Science, page 495--509. Springer, (2005)A Fair and Abuse-Free Contract Signing Protocol from Boneh-Boyen Signature., and . EuroPKI, volume 6711 of Lecture Notes in Computer Science, page 125-140. Springer, (2010)Anonymous Subscription Schemes - A Flexible Construction for On-line Services Access., , and . SECRYPT, page 120-131. SciTePress, (2010)An Algebraic Framework for Diffie-Hellman Assumptions., , , , and . CRYPTO (2), volume 8043 of Lecture Notes in Computer Science, page 129-147. Springer, (2013)On proper secrets, ( t , k )-bases and linear codes., and . Des. Codes Cryptogr., 52 (2): 129-154 (2009)Matrix Computational Assumptions in Multilinear Groups., , and . IACR Cryptology ePrint Archive, (2015)Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience., , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 627-642. Springer, (2012)