Author of the publication

Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.

, , , , and . FSE, volume 9054 of Lecture Notes in Computer Science, page 319-341. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asynchronous Veri.able Information Dispersal., and . SRDS, page 191-202. IEEE Computer Society, (2005)Abstract Storage Devices, , and . CoRR, (2007)Privacy and Efficiency Tradeoffs for Multiword Top K Search with Linear Additive Rank Scoring., , , , and . WWW, page 1725-1734. ACM, (2018)Optimal Resilience for Erasure-Coded Byzantine Distributed Storage., and . DSN, page 115-124. IEEE Computer Society, (2006)TaoStore: Overcoming Asynchronicity in Oblivious Data Storage., , , , and . IEEE Symposium on Security and Privacy, page 198-217. IEEE Computer Society, (2016)Optimally Secure Block Ciphers from Ideal Primitives.. ASIACRYPT (2), volume 9453 of Lecture Notes in Computer Science, page 437-462. Springer, (2015)Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation., , and . ASIACRYPT (2), volume 8874 of Lecture Notes in Computer Science, page 102-121. Springer, (2014)A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical., and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 364-381. Springer, (2009)Asynchronous Verifiable Information Dispersal., and . DISC, volume 3724 of Lecture Notes in Computer Science, page 503-504. Springer, (2005)The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC., , and . CRYPTO (1), volume 9215 of Lecture Notes in Computer Science, page 368-387. Springer, (2015)