Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum Indistinguishability of Random Sponges., , and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 296-325. Springer, (2019)Tight adaptive reprogramming in the QROM., , , and . IACR Cryptol. ePrint Arch., (2020)The security of Kyber's FO-transform., and . IACR Cryptol. ePrint Arch., (2023)Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model., , , , and . IACR Cryptol. ePrint Arch., (2023)The Return of the SDitH., , , , , and . IACR Cryptol. ePrint Arch., (2022)Rapidly Verifiable XMSS Signatures., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (1): 137-168 (2021)Report on evaluation of KpqC candidates., , , , , , , , , and . IACR Cryptol. ePrint Arch., (2023)Recovering the Tight Security Proof of SPHINCS+., and . ASIACRYPT (4), volume 13794 of Lecture Notes in Computer Science, page 3-33. Springer, (2022)Tight Adaptive Reprogramming in the QROM., , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 637-667. Springer, (2021)Tighter proofs of CCA security in the quantum random oracle model., , , and . IACR Cryptology ePrint Archive, (2019)