Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
3
KIVR: Committing Authenticated Encryption Using Redundancy ..:
, In:
?
Topics in Cryptology – CT-RSA 2024; Lecture Notes in Computer Science ,
4
The Multi-user Security of MACs via Universal Hashing in th..:
, In:
?
Topics in Cryptology – CT-RSA 2024; Lecture Notes in Computer Science ,
6
The Exact Multi-user Security of 2-Key Triple DES:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2024 ,
8
The Exact Multi-user Security of (Tweakable) Key Alternatin..:
, In:
?
Lecture Notes in Computer Science; Information Security ,
14