Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure., , , , , , and . Inf. Process. Lett., 109 (16): 897-901 (2009)More Constructions of Lossy and Correlation-Secure Trapdoor Functions., , , , and . Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, page 279-295. Springer, (2010)Hybrid Encryption in a Multi-user Setting, Revisited., , and . Public Key Cryptography (1), volume 10769 of Lecture Notes in Computer Science, page 159-189. Springer, (2018)Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups., , and . Public Key Cryptography (1), volume 10769 of Lecture Notes in Computer Science, page 348-377. Springer, (2018)On the Selective Opening Security of Practical Public-Key Encryption Schemes., , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 27-51. Springer, (2015)Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model., , , and . Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, page 1-18. Springer, (2010)On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model., and . EUROCRYPT, volume 5479 of Lecture Notes in Computer Science, page 389-406. Springer, (2009)Message Authentication, Revisited., , , and . EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, page 355-374. Springer, (2012)Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles., and . SCN, volume 4116 of Lecture Notes in Computer Science, page 173-185. Springer, (2006)Public-Key Encryption with Non-interactive Opening., , , and . CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 239-255. Springer, (2008)