Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of the PKCS#1 v1.5 Signature Scheme., , and . ACM Conference on Computer and Communications Security, page 1195-1208. ACM, (2018)Certifying RSA., , and . ASIACRYPT, volume 7658 of Lecture Notes in Computer Science, page 404-414. Springer, (2012)Tightly-Secure Signatures from Chameleon Hash Functions., , , and . IACR Cryptology ePrint Archive, (2014)How to build time-lock encryption., , , and . Des. Codes Cryptogr., 86 (11): 2549-2586 (2018)Tightly-Secure Signatures from Chameleon Hash Functions., , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 256-279. Springer, (2015)On the improvement of security proofs.. Ruhr University Bochum, (2015)On the Security of RSA-PSS in the Wild.. SSR, page 23-34. ACM, (2019)Group Signatures Without q-Assumptions., and . IACR Cryptology ePrint Archive, (2015)Extractable Witness Encryption and Timed-Release Encryption from Bitcoin., , and . IACR Cryptology ePrint Archive, (2015)Optimal Security Proofs for Full Domain Hash, Revisited., and . EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, page 537-553. Springer, (2012)