Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates., and . IACR Cryptology ePrint Archive, (2017)Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3., , and . IACR Cryptology ePrint Archive, (2017)The Status of Quantum-Based Long-Term Secure Communication over the Internet., , , , , , , , and . CoRR, (2017)Secure Logging Schemes and Certificate Transparency., , , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 140-158. Springer, (2016)A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates., , , and . ACM Conference on Computer and Communications Security, page 1197-1210. ACM, (2015)Linkable Message Tagging: Solving the key distribution problem of signature schemes., and . IACR Cryptology ePrint Archive, (2014)Data Is a Stream: Security of Stream-Based Channels., , , and . IACR Cryptology ePrint Archive, (2017)A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol., , , and . IACR Cryptology ePrint Archive, (2016)Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation., , and . CANS, volume 8813 of Lecture Notes in Computer Science, page 321-336. Springer, (2014)Multi-Stage Key Exchange and the Case of Google's QUIC Protocol., and . ACM Conference on Computer and Communications Security, page 1193-1204. ACM, (2014)