Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content-Centric Networking (CCNx) Messages in TLV Format., , and . RFC, (July 2019)This is not the padding you are looking for! On the ineffectiveness of QUIC PADDING against website fingerprinting., , , , , and . CoRR, (2022)Security Analysis of Signature Schemes with Key Blinding., , and . IACR Cryptol. ePrint Arch., (2023)Hashing to Elliptic Curves., , , , and . RFC, (August 2023)Oblivious Pseudorandom Functions (OPRFs) Using Prime-Order Groups., , , and . RFC, (December 2023)Secure Fragmentation for Content Centric Networking., and . MASS, page 506-512. IEEE Computer Society, (2015)Implementing and Measuring KEMTLS., , , , , , , and . LATINCRYPT, volume 12912 of Lecture Notes in Computer Science, page 88-107. Springer, (2021)A Fast and Simple Partially Oblivious PRF, with Applications., , , , , and . EUROCRYPT (2), volume 13276 of Lecture Notes in Computer Science, page 674-705. Springer, (2022)High level synthesis: Where are we? A case study on matrix multiplication., , , and . ReConFig, page 1-7. IEEE, (2013)Content-Centric Networking - Architectural Overview and Protocol Description., , and . CoRR, (2017)