Author of the publication

Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited.

, , and . ASIACRYPT (1), volume 8269 of Lecture Notes in Computer Science, page 134-153. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes., , , and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 532-560. Springer, (2015)The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol., , and . EUROCRYPT (1), volume 11476 of Lecture Notes in Computer Science, page 129-158. Springer, (2019)Rate-Optimizing Compilers for Continuously Non-malleable Codes., , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 3-23. Springer, (2019)Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited., , and . ASIACRYPT (1), volume 8269 of Lecture Notes in Computer Science, page 134-153. Springer, (2013)Non-malleable Encryption: Simpler, Shorter, Stronger., , , , and . J. Cryptol., 33 (4): 1984-2033 (2020)Modular Design of Secure Group Messaging Protocols and the Security of MLS., , , and . CCS, page 1463-1483. ACM, (2021)Fast Isomorphic State Channels., , , , , , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 339-358. Springer, (2021)On Seedless PRNGs and Premature Next., , , , and . ITC, volume 230 of LIPIcs, page 9:1-9:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Security Analysis and Improvements for the IETF MLS Standard for Group Messaging., , , and . CRYPTO (1), volume 12170 of Lecture Notes in Computer Science, page 248-277. Springer, (2020)Continuous Group Key Agreement with Active Security., , , and . TCC (2), volume 12551 of Lecture Notes in Computer Science, page 261-290. Springer, (2020)