Author of the publication

ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.

, , , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 381-399. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Coding-Theoretic Approach to Recovering Noisy RSA Keys., , and . ASIACRYPT, volume 7658 of Lecture Notes in Computer Science, page 386-403. Springer, (2012)libInterMAC: Beyond Confidentiality and Integrity in Practice., , and . IACR Trans. Symmetric Cryptol., 2019 (1): 46-83 (2019)Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs., , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 299-319. Springer, (2005)A Cryptographic Analysis of the WireGuard Protocol., and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 3-21. Springer, (2018)Security of Symmetric Encryption against Mass Surveillance., , and . CRYPTO (1), volume 8616 of Lecture Notes in Computer Science, page 1-19. Springer, (2014)Modular Security Proofs for Key Agreement Protocols., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 549-565. Springer, (2005)Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract)., and . Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, page 171-175. Springer, (2008)Perfect Factors in the de Bruijn Graph.. Des. Codes Cryptogr., 5 (2): 115-138 (1995)Certificateless Encryption Schemes Strongly Secure in the Standard Model., , and . IACR Cryptology ePrint Archive, (2007)Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan., and . IACR Cryptology ePrint Archive, (2003)