Author of the publication

Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited.

, , and . ASIACRYPT (1), volume 8269 of Lecture Notes in Computer Science, page 134-153. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Per-session security: Password-based cryptography revisited., , , and . J. Comput. Secur., 27 (1): 75-111 (2019)Anonymity-Preserving Public-Key Encryption: A Constructive Approach., , , , and . Privacy Enhancing Technologies, volume 7981 of Lecture Notes in Computer Science, page 19-39. Springer, (2013)The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3., and . CRYPTO (1), volume 9814 of Lecture Notes in Computer Science, page 247-276. Springer, (2016)Toward an algebraic theory of systems., , , , and . Theor. Comput. Sci., (2018)Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC., , , , and . TCC (3), volume 12552 of Lecture Notes in Computer Science, page 1-30. Springer, (2020)Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric., , , and . CANS, volume 13099 of Lecture Notes in Computer Science, page 435-459. Springer, (2021)Synchrony amplification., and . ISIT, page 1583-1587. IEEE, (2012)Robust Authenticated Encryption and the Limits of Symmetric Cryptography., , , , and . IMACC, volume 9496 of Lecture Notes in Computer Science, page 112-129. Springer, (2015)On Composable Security for Digital Signatures., , and . Public Key Cryptography (1), volume 10769 of Lecture Notes in Computer Science, page 494-523. Springer, (2018)Privacy-preserving auditable token payments in a permissioned blockchain system., , , , , and . AFT, page 255-267. ACM, (2020)