Author of the publication

Secret Locking: Exploring New Approaches to Biometric Key Encapsulation.

, , and . ICETE (Selected Papers), volume 3 of Communications in Computer and Information Science, page 101-112. (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Encrypted Blockchain Databases., , , and . AFT, page 241-254. ACM, (2020)Revisiting Leakage Abuse Attacks., , and . NDSS, The Internet Society, (2020)Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage., , and . IMACC, volume 9496 of Lecture Notes in Computer Science, page 311-328. Springer, (2015)An Optimal Relational Database Encryption Scheme., , , and . IACR Cryptology ePrint Archive, (2020)SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data., , , , , and . EuroS&P, page 90-108. IEEE, (2022)An Extensible Platform for Evaluating Security Protocols., , , , and . Annual Simulation Symposium, page 204-213. IEEE Computer Society, (2005)Parallel and Dynamic Searchable Symmetric Encryption., and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 258-274. Springer, (2013)Revisiting Leakage Abuse Attacks., , and . IACR Cryptology ePrint Archive, (2019)Computationally Volume-Hiding Structured Encryption., and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 183-213. Springer, (2019)Secret Locking: Exploring New Approaches to Biometric Key Encapsulation., , and . ICETE (Selected Papers), volume 3 of Communications in Computer and Information Science, page 101-112. (2005)