Author of the publication

Authentication Key Recovery on Galois/Counter Mode (GCM).

, and . AFRICACRYPT, volume 9646 of Lecture Notes in Computer Science, page 127-143. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication Key Recovery in Galois/Counter Mode (GCM).. IACR Cryptol. ePrint Arch., (2015)Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods., , and . RFC, (February 2022)Extension of the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) to Transport Layer Security (TLS)., , and . RFC, (July 2023)Security of Symmetric Ratchets and Key Chains - Implications for Protocols like TLS 1.3, Signal, and PQ3.. IACR Cryptol. ePrint Arch., (2024)Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal.. CANS, volume 14342 of Lecture Notes in Computer Science, page 251-267. Springer, (2023)Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols., , , , , and . IEEE Access, (2024)Authentication Key Recovery on Galois/Counter Mode (GCM)., and . AFRICACRYPT, volume 9646 of Lecture Notes in Computer Science, page 127-143. Springer, (2016)X.509 Certificate Extension for 5G Network Function Types., , , and . RFC, (January 2023)EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3., and . RFC, (February 2022)Evaluation of VoIP media security for smartphones in the context of IMS., , and . Swe-CTW, page 123-128. IEEE, (2011)