Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure identification and QKD in the bounded-quantum-storage model., , , and . Theor. Comput. Sci., (2014)Position-Based Quantum Cryptography., , and . ERCIM News, 2011 (85): 16-17 (2011)From Classical to Quantum Information - Or: When You Have Less Than No Uncertainty.. ERCIM News, (2018)Unfair Noisy Channels and Oblivious Transfer., , , and . TCC, volume 2951 of Lecture Notes in Computer Science, page 355-373. Springer, (2004)Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority., , and . IACR Cryptology ePrint Archive, (2011)Quantum Authentication and Encryption with Key Recycling., and . IACR Cryptology ePrint Archive, (2017)On the Parallel Repetition of Multi-Player Games: The No-Signaling Case., , and . TQC, volume 27 of LIPIcs, page 24-35. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2014)Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments., , and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 206-223. Springer, (2002)Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks., , , and . EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, page 381-402. Springer, (2010)Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary., and . EUROCRYPT (3), volume 11478 of Lecture Notes in Computer Science, page 472-499. Springer, (2019)