Search for persons
X
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
1
Populating the Zoo of Rugged Pseudorandom Permutations:
, In:
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
2
The Indifferentiability of the Duplex and Its Practical App..:
, In:
?
Advances in Cryptology – CRYPTO 2022; Lecture Notes in Computer Science ,
3
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Ord..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
4
The Security of ChaCha20-Poly1305 in the Multi-User Setting:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
5
Hiding the Lengths of Encrypted Messages via Gaussian Paddi..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2019 ,
6
Sponges Resist Leakage: The Case of Authenticated Encryptio:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2018 ,
7
Simulatable Channels: Extended Security that is Universally..:
, In:
?
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ,
8
A Surfeit of SSH Cipher Suites:
, In:
?
Proceedings of the 17th ACM conference on Computer and communications security ,
11
On the (in)security of IPsec in MAC-then-encrypt configurat..:
, In:
?
Proceedings of the first international conference on Networks for grid applications ,
12