Author of the publication

(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.

, and . PQCrypto, volume 11505 of Lecture Notes in Computer Science, page 249-268. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Groth-Sahai Proofs Revisited Again: A Bug in Öptimized" Randomization.. IACR Cryptology ePrint Archive, (2016)Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017.. IACR Cryptology ePrint Archive, (2017)Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices., , , , and . IACR Cryptology ePrint Archive, (2015)Improved Quantum Multicollision-Finding Algorithm., , , and . PQCrypto, volume 11505 of Lecture Notes in Computer Science, page 350-367. Springer, (2019)Cryptanalysis of Compact-LWE., , and . CT-RSA, volume 10808 of Lecture Notes in Computer Science, page 80-97. Springer, (2018)Secure Hierarchical Identity-Based Identification without Random Oracles., , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 258-273. Springer, (2012)Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions., and . LATINCRYPT, volume 9230 of Lecture Notes in Computer Science, page 3-20. Springer, (2015)Practical Cryptanalysis of a Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017.. PQCrypto, volume 10786 of Lecture Notes in Computer Science, page 142-161. Springer, (2018)Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge., and . ProvSec, volume 5848 of Lecture Notes in Computer Science, page 198-213. Springer, (2009)Non-malleable Multiple Public-Key Encryption., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (6): 1318-1334 (2014)