Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abstract Storage Devices, , and . CoRR, (2007)Generalized privacy amplification., , , and . IEEE Trans. Inf. Theory, 41 (6): 1915-1923 (1995)Abstract Models of Computation in Cryptography.. IMACC, volume 3796 of Lecture Notes in Computer Science, page 1-12. Springer, (2005)New Approaches to Digital Evidence.. Proc. IEEE, 92 (6): 933-947 (2004)Unifying Zero-Knowledge Proofs of Knowledge.. AFRICACRYPT, volume 5580 of Lecture Notes in Computer Science, page 272-286. Springer, (2009)Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology., , and . TCC, volume 2951 of Lecture Notes in Computer Science, page 21-39. Springer, (2004)Intrinsic Limitations of Digital Signatures and How to Cope with Them.. ISC, volume 2851 of Lecture Notes in Computer Science, page 180-192. Springer, (2003)Robustness for Free in Unconditional Multi-party Computation., and . CRYPTO, volume 2139 of Lecture Notes in Computer Science, page 101-118. Springer, (2001)Linking Information Reconciliation and Privacy Amplification (Extended Abstract)., and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 266-274. Springer, (1994)Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations., and . ASIACRYPT, volume 4833 of Lecture Notes in Computer Science, page 427-443. Springer, (2007)