Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation., , and . IACR Cryptology ePrint Archive, (2014)Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation., , and . ICALP (1), volume 9134 of Lecture Notes in Computer Science, page 456-468. Springer, (2015)Continuously Non-malleable Codes with Split-State Refresh., , , and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 121-139. Springer, (2018)Continuously Non-malleable Secret Sharing for General Access Structures., , and . TCC (2), volume 11892 of Lecture Notes in Computer Science, page 211-232. Springer, (2019)Predictable Arguments of Knowledge., , and . Public Key Cryptography (1), volume 10174 of Lecture Notes in Computer Science, page 121-150. Springer, (2017)Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage., , and . IMA Int. Conf., volume 9496 of Lecture Notes in Computer Science, page 311-328. Springer, (2015)Proofs of Space: When Space Is of the Essence., , , and . SCN, volume 8642 of Lecture Notes in Computer Science, page 538-557. Springer, (2014)Auditable Asymmetric Password Authenticated Public Key Establishment., , , and . IACR Cryptol. ePrint Arch., (2020)Proofs of Space: When Space is of the Essence., , , and . IACR Cryptology ePrint Archive, (2013)Non-Malleable Codes with Split-State Refresh., and . IACR Cryptology ePrint Archive, (2016)