Author of the publication

Quantum Authentication and Encryption with Key Recycling.

, and . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure identification and QKD in the bounded-quantum-storage model., , , and . Theor. Comput. Sci., (2014)Quantum Authentication and Encryption with Key Recycling., and . IACR Cryptology ePrint Archive, (2017)Position-Based Quantum Cryptography., , and . ERCIM News, 2011 (85): 16-17 (2011)From Classical to Quantum Information - Or: When You Have Less Than No Uncertainty.. ERCIM News, (2018)Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority., , and . IACR Cryptology ePrint Archive, (2011)On the Parallel Repetition of Multi-Player Games: The No-Signaling Case., , and . TQC, volume 27 of LIPIcs, page 24-35. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2014)Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary., and . EUROCRYPT (3), volume 11478 of Lecture Notes in Computer Science, page 472-499. Springer, (2019)One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games., , , and . EUROCRYPT, volume 7881 of Lecture Notes in Computer Science, page 609-625. Springer, (2013)Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks., , , and . EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, page 381-402. Springer, (2010)Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments., , and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 206-223. Springer, (2002)