Author of the publication

Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH.

, , and . IACR Cryptol. ePrint Arch., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Future of Digital Investigation: Automated Legal Inference., and . IEEE Secur. Priv., 21 (1): 84-90 (January 2023)Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake., , , , and . IACR Cryptol. ePrint Arch., (2021)Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation., and . PQCrypto, volume 14154 of Lecture Notes in Computer Science, page 535-564. Springer, (2023)Associative Blockchain for Decentralized PKI Transparency., , , and . Cryptogr., 5 (2): 14 (2021)A reduction-based proof for authentication and session key security in three-party Kerberos., and . Int. J. Appl. Cryptogr., 4 (2): 61-84 (2022)Efficient Oblivious Database Joins., , and . Proc. VLDB Endow., 13 (11): 2132-2145 (2020)Improved attacks against key reuse in learning with errors key exchange., , and . IACR Cryptol. ePrint Arch., (2020)Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements., , and . ESORICS (1), volume 14344 of Lecture Notes in Computer Science, page 168-188. Springer, (2023)SoK: Game-Based Security Models for Group Key Exchange., , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 148-176. Springer, (2021)A Cryptographic Analysis of the TLS 1.3 Handshake Protocol., , , and . J. Cryptol., 34 (4): 37 (2021)