Author of the publication

Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).

, , , , , , and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 114-127. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR., , , and . SCN, volume 11035 of Lecture Notes in Computer Science, page 160-177. Springer, (2018)Fast Batch Verification of Multiple Signatures., and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 442-457. Springer, (2007)An Identity-Based Signature from Gap Diffie-Hellman Groups., and . Public Key Cryptography, volume 2567 of Lecture Notes in Computer Science, page 18-30. Springer, (2003)A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents., and . Public Key Cryptography, volume 4939 of Lecture Notes in Computer Science, page 328-343. Springer, (2008)Diffie-Hellman Conjugacy Problem on Braids, and . Cryptology ePrint Archive, (2003)http://eprint.iacr.org/2003/019/.Numerical Method for Comparison on Homomorphically Encrypted Numbers., , , , and . ASIACRYPT (2), volume 11922 of Lecture Notes in Computer Science, page 415-445. Springer, (2019)Private Over-Threshold Aggregation Protocols., , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 472-486. Springer, (2012)A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction., , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 28-44. Springer, (2018)Need for Controllers Having Integer Coefficients in Homomorphically Encrypted Dynamic System., , , , and . CDC, page 5020-5025. IEEE, (2018)Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map., , , and . Public Key Cryptography, volume 1431 of Lecture Notes in Computer Science, page 195-202. Springer, (1998)