Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants.. IACR Cryptology ePrint Archive, (2007)Improving SSL Handshake Performance via Batching., and . CT-RSA, volume 2020 of Lecture Notes in Computer Science, page 28-43. Springer, (2001)The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions., , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 310-325. Springer, (2013)The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing., , , , and . login Usenix Mag., (2020)Too LeJIT to Quit: Extending JIT Spraying to ARM., , and . NDSS, The Internet Society, (2015)Fast-Track Session Establishment for TLS., and . NDSS, The Internet Society, (2002)Short Signatures from the Weil Pairing., , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 514-532. Springer, (2001)OpenScan: A Fully Transparent Optical Scan Voting System., , , and . EVT/WOTE, USENIX Association, (2010)The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders., , and . USENIX Security Symposium, page 6647-6664. USENIX Association, (2023)New paradigms in signature schemes.. Stanford University, USA, (2006)