Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields., , and . CoRR, (2018)Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits., and . CoRR, (2018)Protocol Variants and Electronic Identification.. IACR Cryptology ePrint Archive, (2013)A new security proof for Damgård's ElGamal.. IACR Cryptology ePrint Archive, (2004)Side Channels in Deduplication: Trade-offs between Leakage and Efficiency., , , , and . AsiaCCS, page 266-274. ACM, (2017)A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability., and . Financial Cryptography Workshops, volume 10323 of Lecture Notes in Computer Science, page 404-418. Springer, (2017)Highly Efficient Key Exchange Protocols with Optimal Tightness., , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 767-797. Springer, (2019)A framework for compositional verification of security protocols., , , , , and . Inf. Comput., 206 (2-4): 425-459 (2008)An experiment on the security of the Norwegian electronic voting protocol., and . Annales des Télécommunications, 71 (7-8): 299-307 (2016)Spreading Alerts Quietly and the Subgroup Escape Problem., , , , and . J. Cryptology, 28 (4): 796-819 (2015)