Search for persons
X
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2023 ,
1
Hardening Signature Schemes via Derive-then-Derandomize: St..:
, In:
?
Topics in Cryptology – CT-RSA 2023; Lecture Notes in Computer Science ,
2
Flexible Password-Based Encryption: Securing Cloud Storage ..:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
3
When Messages Are Keys: Is HMAC a Dual-PRF?:
, In:
?
Advances in Cryptology – CRYPTO 2022; Lecture Notes in Computer Science ,
4
Better than Advertised Security for Non-interactive Thresho..:
, In:
?
Advances in Cryptology – EUROCRYPT 2022; Lecture Notes in Computer Science ,
5
Efficient Schemes for Committing Authenticated Encryption:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
6
Chain Reductions for Multi-signatures and the HBMS Scheme:
, In:
?
Progress in Cryptology – INDOCRYPT 2020; Lecture Notes in Computer Science ,
7
The Multi-Base Discrete Logarithm Problem: Tight Reductions..:
, In:
?
Advances in Cryptology – EUROCRYPT 2020; Lecture Notes in Computer Science ,
8
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Re..:
, In:
?
Advances in Cryptology – EUROCRYPT 2020; Lecture Notes in Computer Science ,
9
Security Under Message-Derived Keys: Signcryption in iMessa..:
, In:
?
Progress in Cryptology – INDOCRYPT 2020; Lecture Notes in Computer Science ,
10
Dual-Mode NIZKs: Possibility and Impossibility Results for ..:
, In:
?
Progress in Cryptology – INDOCRYPT 2020; Lecture Notes in Computer Science ,
12
Incremental Cryptography Revisited: PRFs, Nonces and Modula..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2019 ,
13
The Local Forking Lemma and Its Application to Deterministi..:
, In:
?
Advances in Cryptology – CRYPTO 2019; Lecture Notes in Computer Science ,
14
Nonces Are Noticed: AEAD Revisited:
, In:
?
Secure IT Systems; Lecture Notes in Computer Science ,
15