Author of the publication

Robust Encryption, Extended.

, , and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 149-168. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mixed-radix Naccache-Stern encryption., and . J. Cryptogr. Eng., 9 (3): 277-282 (2019)Public Key-Based Lightweight Swarm Authentication., , , , , , , and . Cyber-Physical Systems Security, Springer, (2018)Fully Homomorphic Encryption: Computations with a Blindfold., , , and . IEEE Secur. Priv., 14 (1): 63-67 (2016)Recovering Secrets From Prefix-Dependent Leakage., , , , and . J. Math. Cryptol., 14 (1): 15-24 (2020)Recovering Secrets From Prefix-Dependent Leakage., , , , and . IACR Cryptol. ePrint Arch., (2018)Robust Encryption, Extended., , and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 149-168. Springer, (2019)Quotient hash tables: efficiently detecting duplicates in streaming data., , and . SAC, page 582-589. ACM, (2019)White-Box Cryptography: Security in an Insecure Environment., , , and . IEEE Secur. Priv., 14 (5): 88-92 (2016)Cdoe Obofsucaitn: Securing Software from Within., , , and . IEEE Secur. Priv., 14 (3): 78-81 (2016)At Most 43 Moves, At Least 29: Optimal Strategies and Bounds for Ultimate Tic-Tac-Toe., , , , and . CoRR, (2020)