Author of the publication

Authenticated Confidential Channel Establishment and the Security of TLS-DHE.

, , , and . J. Cryptol., 30 (4): 1276-1324 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos.. IACR Cryptology ePrint Archive, (2013)DOMPurify: Client-Side Protection Against XSS and Markup Injection., , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 116-134. Springer, (2017)Public Key Encryption and Signature Schemes Based on Polynomials over Zn., and . EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 60-71. Springer, (1996)Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on., , and . EuroS&P, page 321-336. IEEE, (2016)Moderne Verfahren der Krypotgraphie - von RSA zu Zero-Knowledge (6. Aufl.)., , and . Vieweg, (2006)Key-assignment strategies for CPPM., and . MM&Sec, page 107-115. ACM, (2004)SSL-VA-Authentifizierung als Schutz von Phishing und Pharming., , and . Sicherheit, volume P-77 of LNI, page 6-17. GI, (2006)SAMLizing the European Citizen Card., , and . BIOSIG, volume P-155 of LNI, page 105-116. GI, (2009)Waiting for CSP - Securing Legacy Web Applications with JSAgents., , and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 23-42. Springer, (2015)Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption., , , , and . CNS, page 1-9. IEEE, (2020)