Towa, Patrick
21  results:
Search for persons X
?
1

KEMTLS with Delayed Forward Identity Protection in (Almost)..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
3

Short Threshold Dynamic Group Signatures:

, In: Lecture Notes in Computer Science; Security and Cryptography for Networks,
Camenisch, Jan ; Drijvers, Manu ; Lehmann, Anja.. - p. 401-423 , 2020
 
?
4

Public-Key Generation with Verifiable Randomness:

, In: Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science,
 
?
5

Zone Encryption with Anonymous Authentication for V2V Commu..:

, In: 2020 IEEE European Symposium on Security and Privacy (EuroS&P),
Camenisch, Jan ; Drijvers, Manu ; Lehmann, Anja.. - p. 405-424 , 2020
 
?
6

Succinct Diophantine-Satisfiability Arguments:

, In: Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science,
Towa, Patrick ; Vergnaud, Damien - p. 774-804 , 2020
 
?
7

Efficient Fully Secure Leakage-Deterring Encryption:

, In: Cryptography and Coding; Lecture Notes in Computer Science,
 
?
 
?
9

Hardware security without secure hardware: How to decrypt w..:

Blazy, Olivier ; Brouilhet, Laura ; Chevalier, Celine...
info:eu-repo/semantics/altIdentifier/doi/10.1016/j.tcs.2021.09.042.  , 2021
 
?
10

Hardware security without secure hardware: How to decrypt w..:

Blazy, Olivier ; Brouilhet, Laura ; Chevalier, Celine...
info:eu-repo/semantics/altIdentifier/doi/10.1016/j.tcs.2021.09.042.  , 2021
 
?
11

Hardware security without secure hardware: How to decrypt w..:

Blazy, Olivier ; Brouilhet, Laura ; Chevalier, Celine...
info:eu-repo/semantics/altIdentifier/doi/10.1016/j.tcs.2021.09.042.  , 2021
 
?
12

Hardware security without secure hardware: How to decrypt w..:

Blazy, Olivier ; Brouilhet, Laura ; Chevalier, Celine...
info:eu-repo/semantics/altIdentifier/doi/10.1016/j.tcs.2021.09.042.  , 2021
 
?
13

Hardware security without secure hardware: How to decrypt w..:

Blazy, Olivier ; Brouilhet, Laura ; Chevalier, Celine...
info:eu-repo/semantics/altIdentifier/doi/10.1016/j.tcs.2021.09.042.  , 2021
 
?
14

Hardware security without secure hardware: How to decrypt w..:

Blazy, Olivier ; Brouilhet, Laura ; Chevalier, Celine...
info:eu-repo/semantics/altIdentifier/doi/10.1016/j.tcs.2021.09.042.  , 2021
 
?
15

Hardware security without secure hardware: How to decrypt w..:

Blazy, Olivier ; Brouilhet, Laura ; Chevalier, Celine...
info:eu-repo/semantics/altIdentifier/doi/10.1016/j.tcs.2021.09.042.  , 2021
 
1-15