Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Defeating Graph Analysis of Anonymous Transactions., , , , and . IACR Cryptol. ePrint Arch., (2022)On Defeating Graph Analysis of Anonymous Transactions., , , , and . CoRR, (2024)Key-Schedule Security for the TLS 1.3 Standard., , , , , and . ASIACRYPT (1), volume 13791 of Lecture Notes in Computer Science, page 621-650. Springer, (2022)Stop the Flood - Perimeter Security- and Overload- Pre-evaluation in Carrier Grade VoIP Infrastructures., , , and . NEW2AN, volume 7469 of Lecture Notes in Computer Science, page 359-370. Springer, (2012)Practical Attacks against the I2P Network., , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 432-451. Springer, (2013)An Architectural and Evaluative Review of Implicit and Explicit SIP Overload Handling., , , and . Int. J. Meas. Technol. Instrum. Eng., 1 (4): 12-27 (2011)New Random Oracle Instantiations from Extremely Lossy Functions., , , , and . IACR Cryptol. ePrint Arch., (2023)CryptoZoo: A Viewer for Reduction Proofs., , and . IACR Cryptol. ePrint Arch., (2023)Using E-Mail SPAM DNS Blacklists for Qualifying the SPAM-over-Internet-Telephony Probability of a SIP Call., , , and . ICDS, page 254-259. IEEE Computer Society, (2009)Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks., , and . CCS, page 801-815. ACM, (2019)