Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a multi-agent, fiber composite digital fabrication system., , , , , and . Sci. Robotics, (2018)On the Impossibility of Tight Cryptographic Reductions., , , and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 273-304. Springer, (2016)Efficient Signatures with Tight Real World Security in the Random-Oracle Model.. CANS, volume 8813 of Lecture Notes in Computer Science, page 370-383. Springer, (2014)Tightly-Secure Authenticated Key Exchange., , , , and . IACR Cryptology ePrint Archive, (2014)On the possibility and impossibility of tight reductions in cryptography.. Ruhr University Bochum, (2016)Recursive symmetries for geometrically complex and materially heterogeneous additive manufacturing., and . Computer-Aided Design, (2016)Tightly-Secure Authenticated Key Exchange., , , , and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 629-658. Springer, (2015)How Secure is TextSecure?, , , , , and . EuroS&P, page 457-472. IEEE, (2016)On the Impossibility of Tight Cryptographic Reductions., , , and . IACR Cryptology ePrint Archive, (2015)How Secure is TextSecure?, , , , , and . IACR Cryptology ePrint Archive, (2014)