Search for persons
X
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024 ,
1
Updatable Policy-Compliant Signatures:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
3
Agile Cryptography: A Universally Composable Approach:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
4
A Composable Security Treatment of ECVRF and Batch Verifica..:
, In:
?
2021 IEEE 34th Computer Security Foundations Symposium (CSF) ,
5
Consistency for Functional Encryption:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
6
On the (Ir)Replaceability of Global Setups, or How (Not) to..:
, In:
?
Public-Key Cryptography – PKC 2021; Lecture Notes in Computer Science ,
8
Revisiting (R)CCA Security and Replay Protection:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2021 ,
9
Dynamic Ad Hoc Clock Synchronization:
, In:
?
Advances in Cryptology – CRYPTO 2021; Lecture Notes in Computer Science ,
10
A Rational Protocol Treatment of 51% Attacks:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
11
Generalized Proofs of Knowledge with Fully Dynamic Setup:
, In:
?
Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science ,
12
Security Limitations of Classical-Client Delegated Quantum ..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
13
Universal Composition with Global Subroutines: Capturing Gl..:
, In:
?
Lecture Notes in Computer Science; Security and Cryptography for Networks ,
14
A Constructive Perspective on Signcryption Security:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
15