Publication | Date of Publication | Type |
---|
Key Exchange | 2023-08-04 | Paper |
Offline Assisted Group Key Exchange | 2023-06-30 | Paper |
Symmetric Key Exchange with Full Forward Security and Robust Synchronization | 2023-05-26 | Paper |
Fast and secure updatable encryption | 2022-11-09 | Paper |
Designing secure key exchange protocols | 2021-12-20 | Paper |
On strengthening authentication protocols to foil cryptanalysis | 2021-12-20 | Paper |
A formal framework for authentication | 2021-04-07 | Paper |
A blind coupon mechanism enabling veto voting over unreliable networks | 2020-05-12 | Paper |
Secure channels and termination: the last word on TLS | 2020-03-02 | Paper |
Protocols for Authentication and Key Establishment | 2019-10-10 | Paper |
Security notions for cloud storage and deduplication | 2018-11-07 | Paper |
Key recovery: inert and public | 2017-10-23 | Paper |
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS | 2016-04-08 | Paper |
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange | 2016-01-12 | Paper |
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems | 2014-10-16 | Paper |
Continuous After-the-Fact Leakage-Resilient Key Exchange | 2014-07-24 | Paper |
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection | 2012-11-01 | Paper |
Effort-Release Public-Key Encryption from Cryptographic Puzzles | 2012-09-07 | Paper |
Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking | 2012-09-07 | Paper |
On Forward Secrecy in One-Round Key Exchange | 2011-12-16 | Paper |
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy | 2011-12-16 | Paper |
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols | 2011-02-11 | Paper |
Delaying Mismatched Field Multiplications in Pairing Computations | 2010-07-20 | Paper |
Generic One Round Group Key Exchange in the Standard Model | 2010-07-16 | Paper |
Efficient Certificateless KEM in the Standard Model | 2010-07-16 | Paper |
Avoiding Full Extension Field Arithmetic in Pairing Computations | 2010-05-04 | Paper |
Faster Pairings on Special Weierstrass Curves | 2009-08-18 | Paper |
Strongly Secure Certificateless Key Agreement | 2009-08-18 | Paper |
Designing a secure e-tender submission protocol | 2009-05-29 | Paper |
Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
One-round key exchange in the standard model | 2009-05-12 | Paper |
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification | 2009-04-17 | Paper |
Identity-based strong designated verifier signature schemes: attacks and new construction | 2009-04-17 | Paper |
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols | 2009-03-24 | Paper |
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems | 2009-01-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3512572 | 2008-07-21 | Paper |
Efficient One-Round Key Exchange in the Standard Model | 2008-07-08 | Paper |
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions | 2008-04-11 | Paper |
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols | 2008-03-18 | Paper |
Errors in Computational Complexity Proofs for Protocols | 2008-03-18 | Paper |
An Efficient and Verifiable Solution to the Millionaire Problem | 2008-03-17 | Paper |
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy | 2008-03-17 | Paper |
On the Connection Between Signcryption and One-Pass Key Establishment | 2008-03-07 | Paper |
Verifier-Key-Flexible Universal Designated-Verifier Signatures | 2008-03-07 | Paper |
Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys | 2007-09-07 | Paper |
A Novel Range Test | 2007-09-07 | Paper |
Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
Applied Cryptography and Network Security | 2007-05-02 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information Security | 2006-10-20 | Paper |
Security in Communication Networks | 2006-10-10 | Paper |
Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model | 2006-09-12 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
A public key cryptosystem based on a subgroup membership problem | 2005-11-07 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043930 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472408 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472415 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472416 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4473618 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4473635 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472076 | 2004-08-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4452568 | 2004-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450743 | 2004-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4428338 | 2003-09-15 | Paper |
Round-Optimal Contributory Conference Key Agreement | 2003-07-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413340 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788574 | 2003-05-19 | Paper |
Protocols for authentification and key establishment | 2003-05-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149707 | 2002-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149750 | 2002-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501503 | 2002-08-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945386 | 2002-04-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945355 | 2002-03-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q2762904 | 2002-01-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4707237 | 2002-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4950047 | 2001-10-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4950063 | 2001-10-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707402 | 2001-08-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721130 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721133 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721171 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501511 | 2000-09-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4934730 | 2000-02-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249272 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250627 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250643 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4400582 | 1998-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3839194 | 1998-10-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373652 | 1998-08-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373647 | 1998-07-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341788 | 1997-06-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4322843 | 1995-02-13 | Paper |
Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects | 1993-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4011767 | 1992-09-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q3778801 | 1988-01-01 | Paper |
On the structure of the family of Cherry fields on the torus | 1985-01-01 | Paper |
Residuation in semigroups of pre-closures | 1976-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4084916 | 1976-01-01 | Paper |