Author of the publication

Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs.

, , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 697-723. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessment of network module identification across complex diseases, , , , , , , , , and 168 other author(s). Nature Methods, 16 (9): 843--852 (2019)Tight Security Bounds for Double-Block Hash-then-Sum MACs., , and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 435-465. Springer, (2020)On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs., and . ACM Trans. Inf. Syst. Secur., 11 (2): 1:1-1:35 (2008)Extraction of hidden information by efficient community detection in networks, , and . CoRR, (2012)Adaptive Preimage Resistance and Permutation-based Hash Functions., and . IACR Cryptology ePrint Archive, (2009)Link community detection through global optimization and the inverse resolution limit of partition density., , , , and . CoRR, (2016)Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds., , , , , , and . IEEE Internet Things J., 5 (4): 2441-2448 (2018)Application of conformational space annealing to the protein structure modeling using cryo-EM maps., , , and . J. Comput. Chem., 44 (30): 2332-2346 (2023)Prediction of Protein Structure by Template-Based Modeling Combined with the UNRES Force Field., , , , , and . J. Chem. Inf. Model., 55 (6): 1271-1281 (2015)Partition and mix: generalizing the swap-or-not shuffle., and . Des. Codes Cryptogr., 91 (6): 2237-2254 (2023)