Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Per-session security: Password-based cryptography revisited., , , and . J. Comput. Secur., 27 (1): 75-111 (2019)Anonymity-Preserving Public-Key Encryption: A Constructive Approach., , , , and . Privacy Enhancing Technologies, volume 7981 of Lecture Notes in Computer Science, page 19-39. Springer, (2013)Robust Authenticated Encryption and the Limits of Symmetric Cryptography., , , , and . IMACC, volume 9496 of Lecture Notes in Computer Science, page 112-129. Springer, (2015)Toward an algebraic theory of systems., , , , and . Theor. Comput. Sci., (2018)Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC., , , , and . TCC (3), volume 12552 of Lecture Notes in Computer Science, page 1-30. Springer, (2020)The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3., and . CRYPTO (1), volume 9814 of Lecture Notes in Computer Science, page 247-276. Springer, (2016)Synchrony amplification., and . ISIT, page 1583-1587. IEEE, (2012)Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric., , , and . CANS, volume 13099 of Lecture Notes in Computer Science, page 435-459. Springer, (2021)Causal Boxes: Quantum Information-Processing Systems Closed under Composition., , , , and . CoRR, (2015)On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption., and . ACM Conference on Computer and Communications Security, page 505-515. ACM, (2010)