Author of the publication

Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal.

, and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 734-751. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal., and . Des. Codes Cryptogr., 74 (1): 183-218 (2015)Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal., and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 734-751. Springer, (2012)Strengthening the security of authenticated key exchange against bad randomness., and . Des. Codes Cryptogr., 86 (3): 481-516 (2018)Strengthening the security of key exchange protocols.. ETH Zurich, Zürich, Switzerland, (2014)base-search.net (ftethz:oai:www.research-collection.ethz.ch:20.500.11850/84662).