Search for persons
X
?
Topics in Cryptology – CT-RSA 2024; Lecture Notes in Computer Science ,
3
Batch Signatures, Revisited:
, In:
?
Handbook for Management of Threats; Springer Optimization and Its Applications ,
4
Quantum Computers: The Need for a New Cryptographic Strateg:
, In:
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
5
To Attest or Not to Attest, This is the Question – Provable..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
7
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
8
Light the Signal: Optimization of Signal Leakage Attacks Ag..:
, In:
?
Progress in Cryptology – LATINCRYPT 2021; Lecture Notes in Computer Science ,
10
Improved Attacks Against Key Reuse in Learning with Errors ..:
, In:
?
Post-Quantum Cryptography; Lecture Notes in Computer Science ,
11
Decryption Failure Is More Likely After Success:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
13
The Lattice-Based Digital Signature Scheme qTESLA:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
14
Tighter Proofs of CCA Security in the Quantum Random Oracle..:
, In:
?
Post-Quantum Cryptography; Lecture Notes in Computer Science ,
15