Author of the publication

STROBE: Streaming Threshold Random Beacons.

, , , , , , , , and . AFT, volume 282 of LIPIcs, page 7:1-7:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aggregating hash-based signatures using STARKs., , , and . IACR Cryptol. ePrint Arch., (2021)Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols., , , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 227-238. Springer, (2007)Parallel Collection of Live Data Using Hadoop., , , and . Panhellenic Conference on Informatics, page 66-71. IEEE Computer Society, (2010)Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations., , , and . CAMAD, page 194-199. IEEE, (2023)Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm., , and . IEC (Prague), page 137-142. Enformatika, Çanakkale, Turkey, (2005)Surveying Wi-Fi Security - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki., , , and . WINSYS, page 96-101. INSTICC Press, (2008)SoK: Auditability and Accountability in Distributed Payment Systems., , and . ACNS (2), volume 12727 of Lecture Notes in Computer Science, page 311-337. Springer, (2021)Low-cost Anonymous Timed-Release Encryption., , and . IAS, page 77-82. IEEE Computer Society, (2007)Practical Implementation of Identity Based Encryption for Secure E-mail Communication., , and . Panhellenic Conference on Informatics, page 101-106. IEEE Computer Society, (2010)A Provably Secure One-Pass Two-Party Key Establishment Protocol., , , , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 108-122. Springer, (2007)