Author of the publication

Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC.

, , , , , , , , and . CANS, volume 12579 of Lecture Notes in Computer Science, page 211-231. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tightly-Secure Authenticated Key Exchange, Revisited., , , and . IACR Cryptol. ePrint Arch., (2020)On Tight Security Proofs for Schnorr Signatures., , and . J. Cryptol., 32 (2): 566-599 (2019)Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT., , and . J. Cryptol., 34 (3): 20 (2021)On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments., and . J. Cryptol., 34 (3): 30 (2021)Highly Efficient Key Exchange Protocols with Optimal Tightness., , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 767-797. Springer, (2019)Subversion-Resilient Authenticated Encryption Without Random Oracles., , , , and . ACNS, volume 13906 of Lecture Notes in Computer Science, page 460-483. Springer, (2023)More Efficient Digital Signatures with Tight Multi-user Security., , , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 1-31. Springer, (2021)Automated Information Leakage Detection: A New Method Combining Machine Learning and Hypothesis Testing with an Application to Side-channel Detection in Cryptographic Protocols., , , , , and . ICAART (2), page 152-163. SCITEPRESS, (2022)Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol., , , , , , and . CRYPTO (4), volume 14084 of Lecture Notes in Computer Science, page 330-361. Springer, (2023)On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation., , , and . CRYPTO (4), volume 14084 of Lecture Notes in Computer Science, page 297-329. Springer, (2023)