Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardness Preserving Constructions of Pseudorandom Functions., , and . TCC, volume 7194 of Lecture Notes in Computer Science, page 369-382. Springer, (2012)Leakage-Resilient Signatures., , , and . TCC, volume 5978 of Lecture Notes in Computer Science, page 343-360. Springer, (2010)Composition of Random Systems: When Two Weak Make One Strong., and . TCC, volume 2951 of Lecture Notes in Computer Science, page 410-427. Springer, (2004)Key-Homomorphic Constrained Pseudorandom Functions., , , , and . TCC (2), volume 9015 of Lecture Notes in Computer Science, page 31-60. Springer, (2015)Condensed Unpredictability., , and . ICALP (1), volume 9134 of Lecture Notes in Computer Science, page 1046-1057. Springer, (2015)Efficient Authentication from Hard Learning Problems., , , , and . EUROCRYPT, volume 6632 of Lecture Notes in Computer Science, page 7-26. Springer, (2011)Reversible Proofs of Sequential Work., , , , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 277-291. Springer, (2019)A New Mode of Operation for Block Ciphers and Length-Preserving MACs., , and . EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, page 198-219. Springer, (2008)The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations., and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 544-561. Springer, (2003)Luby-Rackoff Ciphers from Weak Round Functions?, , , and . EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, page 391-408. Springer, (2006)