Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes., , , and . ICB, volume 4642 of Lecture Notes in Computer Science, page 604-613. Springer, (2007)On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order., , and . J. Cryptology, 19 (4): 463-487 (2006)Server-Aided Verification: Theory and Practice., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 605-623. Springer, (2005)On the Length of Cryptographic Hash-Values Used in Identification Schemes., and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 202-215. Springer, (1994)An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange., and . ESORICS, page 173-184. AFCET, (1990)A (non-practical) three-pass identification protocol using coding theory.. AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 265-272. Springer, (1990)2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms., and . EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 102-109. Springer, (1989)Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1., and . EUROCRYPT, volume 1807 of Lecture Notes in Computer Science, page 81-90. Springer, (2000)Selective Forgery of RSA Signatures Using Redundancy., and . EUROCRYPT, volume 1233 of Lecture Notes in Computer Science, page 495-507. Springer, (1997)Self-Certified Public Keys.. EUROCRYPT, volume 547 of Lecture Notes in Computer Science, page 490-497. Springer, (1991)