Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Threshold DSS Signatures., , , and . Inf. Comput., 164 (1): 54-84 (2001)Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results., , , , and . Int. J. Inf. Sec., 12 (6): 439-465 (2013)Robust and Efficient Sharing of RSA Functions., , , and . J. Cryptology, 20 (3): 393 (2007)Tag-KEM/DEM: A New Framework for Hybrid Encryption., , and . J. Cryptology, 21 (1): 97-130 (2008)Secure distributed storage and retrieval., , , and . Theor. Comput. Sci., 243 (1-2): 363-389 (2000)Incoercible Multiparty Computation., and . IACR Cryptology ePrint Archive, (1996)Identity-Based Key Exchange Protocols without Pairings., and . Trans. Computational Science, (2010)Lattice-Based zk-SNARKs from Square Span Programs., , , and . ACM Conference on Computer and Communications Security, page 556-573. ACM, (2018)Fast Multiparty Threshold ECDSA with Fast Trustless Setup., and . ACM Conference on Computer and Communications Security, page 1179-1194. ACM, (2018)Faster and Shorter Password-Authenticated Key Exchange.. TCC, volume 4948 of Lecture Notes in Computer Science, page 589-606. Springer, (2008)