Author of the publication

A Simple Threshold Authenticated Key Exchange from Short Secrets.

, , , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 566-584. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Second-Preimage Attacks on Hash Functions., , , , , , , and . J. Cryptology, 29 (4): 657-696 (2016)Safe-Errors on SPA Protected implementations with the Atomicity Technique., , , and . IACR Cryptology ePrint Archive, (2015)Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem., , , and . IACR Cryptology ePrint Archive, (2010)Achieving Better Privacy for the 3GPP AKA Protocol., , and . IACR Cryptology ePrint Archive, (2016)On Recovering Affine Encodings in White-Box Implementations., , , and . IACR Cryptology ePrint Archive, (2019)Key Derivation and Randomness Extraction., , , and . IACR Cryptology ePrint Archive, (2005)On the Security of Iterated Hashing based on Forgery-resistant Compression Functions., , , and . IACR Cryptology ePrint Archive, (2009)Computing generator in cyclotomic integer rings., , , and . IACR Cryptology ePrint Archive, (2016)Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures., , , and . IACR Cryptology ePrint Archive, (2016)maskVerif: a formal tool for analyzing software and hardware masked implementations., , , and . IACR Cryptology ePrint Archive, (2018)