Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On an extremal hypergraph problem related to combinatorial batch codes., and . Discret. Appl. Math., (2014)Revisiting Variable Output Length XOR Pseudorandom Function., and . IACR Trans. Symmetric Cryptol., 2018 (1): 314-335 (2018)A Note on the Chi-square Method : A Tool for Proving Cryptographic Security., and . IACR Cryptology ePrint Archive, (2019)Derandomized Construction of Combinatorial Batch Codes.. FCT, volume 9210 of Lecture Notes in Computer Science, page 269-282. Springer, (2015)Luby-Rackoff Backwards with More Users and More Security., and . ASIACRYPT (3), volume 13092 of Lecture Notes in Computer Science, page 345-375. Springer, (2021)Combinatorial Batch Codes: A Lower Bound and Optimal Constructions, , and . CoRR, (2011)Note on an Extremal Hypergraph Problem Related to Combinatorial Batch Codes, and . CoRR, (2012)Combinatorial batch codes: A lower bound and optimal constructions., , and . Adv. Math. Commun., 6 (2): 165-174 (2012)Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the ^2 Method., and . EUROCRYPT (1), volume 10820 of Lecture Notes in Computer Science, page 387-412. Springer, (2018)On Some Permutation Binomials of the Form $x^2^n-1k+1 +ax$ over $F_2^n$ : Existence and Count., , and . WAIFI, volume 7369 of Lecture Notes in Computer Science, page 236-246. Springer, (2012)