Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using quantum key distribution for cryptographic purposes: A survey., , , , , , , , , and 13 other author(s). Theor. Comput. Sci., (2014)IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange., , and . CRYPTO, volume 3152 of Lecture Notes in Computer Science, page 477-493. Springer, (2004)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)BAT: Small and Fast KEM over NTRU Lattices., , , and . IACR Cryptol. ePrint Arch., (2022)Transparent Harddisk Encryption.. CHES, volume 2162 of Lecture Notes in Computer Science, page 273-285. Springer, (2001)Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication., , and . J. Cryptology, 20 (1): 115-149 (2007)Digital Signatures Do Not Guarantee Exclusive Ownership., and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 138-150. (2005)Perfect Block Ciphers with Small Blocks., and . FSE, volume 4593 of Lecture Notes in Computer Science, page 452-465. Springer, (2007)SECOQC White Paper on Quantum Key Distribution and Cryptography, , , , , , , , , and 13 other author(s). CoRR, (2007)Did Filiol Break AES ?, , , , and . IACR Cryptology ePrint Archive, (2003)