Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accelerating Pollard's Rho Algorithm on Finite Fields., , and . J. Cryptology, 25 (2): 195-242 (2012)Improved batch verification of signatures using generalized sparse exponents., and . Computer Standards & Interfaces, (2015)Resistance of S-Boxes against Algebraic Attacks., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 83-94. Springer, (2004)Correcting Errors in Private Keys Obtained from Cold Boot Attacks., , , and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 74-87. Springer, (2011)Private Over-Threshold Aggregation Protocols., , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 472-486. Springer, (2012)S-boxes with Controllable Nonlinearity., , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 286-294. Springer, (1999)A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction., , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 28-44. Springer, (2018)Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption., , , and . IEEE Trans. Information Theory, 54 (11): 5155-5171 (2008)Cryptanalysis of the CLT13 Multilinear Map., , , , and . J. Cryptology, 32 (2): 547-565 (2019)Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption., , , and . IACR Cryptology ePrint Archive, (2005)