Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public key signatures in the multi-user setting., , and . Inf. Process. Lett., 83 (5): 263-266 (2002)Analysis of the Insecurity of ECMQV with Partially Known Nonces., and . ISC, volume 2851 of Lecture Notes in Computer Science, page 240-251. Springer, (2003)Generic Forward-Secure Key Agreement Without Signatures., , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 114-133. Springer, (2017)Efficient Constant Round Multi-party Computation Combining BMR and SPDZ., , , and . CRYPTO (2), volume 9216 of Lecture Notes in Computer Science, page 319-338. Springer, (2015)The algorithmic resolution of diophantine equations - a computational cookbook.. London Mathematical Society student texts Cambridge University Press, (1998)Distributing any Elliptic Curve Based Protocol: With an Application to MixNets., and . IACR Cryptology ePrint Archive, (2019)Flaws in Applying Proof Methodologies to Signature Schemes., , , and . CRYPTO, volume 2442 of Lecture Notes in Computer Science, page 93-110. Springer, (2002)Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?, and . CT-RSA, volume 9610 of Lecture Notes in Computer Science, page 325-340. Springer, (2016)Projective Coordinates Leak., , and . EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, page 257-267. Springer, (2004)First Steps Toward a Cryptography-Aware Language and Compiler., , , and . IACR Cryptology ePrint Archive, (2005)