Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure., , , , , , and . Inf. Process. Lett., 109 (16): 897-901 (2009)Identity-Based (Lossy) Trapdoor Functions and Applications., , , and . IACR Cryptology ePrint Archive, (2011)Tightly-Secure Authenticated Key Exchange., , , , and . IACR Cryptology ePrint Archive, (2014)Polynomial interpolation of cryptographic functions related to Diffie-Hellman and discrete logarithm problem., and . Discrete Applied Mathematics, 154 (2): 326-336 (2006)CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme., , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (1): 238-268 (2018)Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems., , and . IACR Cryptology ePrint Archive, (2009)Hybrid Encryption in a Multi-User Setting, Revisited., , and . IACR Cryptology ePrint Archive, (2017)Secure Computation of the Mean and Related Statistics., , and . TCC, volume 3378 of Lecture Notes in Computer Science, page 283-302. Springer, (2005)A Modular Analysis of the Fujisaki-Okamoto Transformation., , and . TCC (1), volume 10677 of Lecture Notes in Computer Science, page 341-371. Springer, (2017)On the Generic Construction of Identity-Based Signatures with Additional Properties., , and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 178-193. Springer, (2006)