Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combiners for Chosen-Ciphertext Security., , , , and . COCOON, volume 9797 of Lecture Notes in Computer Science, page 257-268. Springer, (2016)Two-Round Man-in-the-Middle Security from LPN., , and . IACR Cryptology ePrint Archive, (2015)Ciphers that securely encipher their own keys., , and . ACM Conference on Computer and Communications Security, page 423-432. ACM, (2011)The Twin Diffie-Hellman Problem and Applications., , and . EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, page 127-145. Springer, (2008)Searching Encrypted Data with Size-Locked Indexes., , , and . USENIX Security Symposium, page 4025-4042. USENIX Association, (2021)Full Database Reconstruction in Two Dimensions., , , , , , and . CCS, page 443-460. ACM, (2020)Cryptographic Agility and Its Relation to Circular Encryption., , , and . EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, page 403-422. Springer, (2010)Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks., and . CRYPTO, volume 6223 of Lecture Notes in Computer Science, page 666-684. Springer, (2010)Cryptography Secure against Related-Key Attacks and Tampering., , and . ASIACRYPT, volume 7073 of Lecture Notes in Computer Science, page 486-503. Springer, (2011)Structured Encryption for Indirect Addressing., , , and . IACR Cryptol. ePrint Arch., (2023)