Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges., and . ProvSec, volume 8209 of Lecture Notes in Computer Science, page 121-138. Springer, (2013)Generic Round-Function Recovery for Feistel Networks over Small Domains., and . IACR Cryptology ePrint Archive, (2018)Practical & Provably Secure Distance-Bounding., , and . IACR Cryptology ePrint Archive, (2013)How to Sequentialize Independent Parallel Attacks?, and . IACR Cryptology ePrint Archive, (2016)Optimization of LPN Solving Algorithms., and . IACR Cryptology ePrint Archive, (2016)An Experiment on DES Statistical Cryptanalysis.. ACM Conference on Computer and Communications Security, page 139-147. ACM, (1996)Private Message Franking with After Opening Privacy., and . IACR Cryptology ePrint Archive, (2018)Privacy failure in the public-key distance-bounding protocols.. IET Inf. Secur., 10 (4): 188-193 (2016)Cryptanalysis of an E0-like Combiner with Memory., and . J. Cryptol., 21 (3): 430-457 (2008)Feistel Ciphers with L2-Decorrelation.. Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 1-14. Springer, (1998)