Search for persons
X
?
Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2024 ,
1
Diving Deep into the Preimage Security of AES-Like Hashing:
, In:
?
Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2023 ,
4
On the Security of Triplex- and Multiplex-Type Construction..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022 ,
5
Implicit Key-Stretching Security of Encryption Schemes:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
6
PAE: Towards More Efficient and BBB-Secure AE from a Single..:
, In:
?
Topics in Cryptology – CT-RSA 2022; Lecture Notes in Computer Science ,
7
Pholkos – Efficient Large-State Tweakable Block Ciphers fro..:
, In:
?
Progress in Cryptology – LATINCRYPT 2021; Lecture Notes in Computer Science ,
9
TEDT2 – Highly Secure Leakage-Resilient TBC-Based Authentic..:
, In:
?
Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science ,
12
Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT):
, In:
?
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems ,
14
SecuriCast : zero-touch two-factor authentication using ..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
15