Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Conference

Practical statistically-sound proofs of exponentiation in any group ; LNCS

  • Source: Hoffmann C, Hubáček P, Kamath C, Klein K, Pietrzak KZ. Practical statistically-sound proofs of exponentiation in any group. In: Advances in Cryptology – CRYPTO 2022

تفاصيل العنوان

×
Conference

CoCoA: Concurrent continuous group key agreement ; LNCS

  • Source: Alwen J, Auerbach B, Cueto Noval M, et al. CoCoA: Concurrent continuous group key agreement. In: Advances in Cryptology – EUROCRYPT 2022 . Vol 13276. Cham: Springer Nature; 2022:815–844. doi:

تفاصيل العنوان

×
Conference

Keep the dirt: tainted TreeKEM, adaptively and actively secure continuous group key agreement

  • Source: Klein K, Pascual Perez G, Walter M, et al. Keep the dirt: tainted TreeKEM, adaptively and actively secure continuous group key agreement. In: 2021 IEEE Symposium on

تفاصيل العنوان

×
Conference

Grafting key trees: Efficient key management for overlapping groups ; LNCS

  • Source: Alwen JF, Auerbach B, Baig MA, et al. Grafting key trees: Efficient key management for overlapping groups. In: 19th International Conference . Vol 13044. Springer Nature; 2021:222-253. doi:

تفاصيل العنوان

×
Conference

The cost of adaptivity in security games on graphs

  • Source: Kamath Hosdurg C, Klein K, Pietrzak KZ, Walter M. The cost of adaptivity in security games on graphs. In: 19th Theory of Cryptography Conference 2021 . International

تفاصيل العنوان

×
Conference

On treewidth, separators and Yao's garbling

  • Source: Kamath Hosdurg C, Klein K, Pietrzak KZ. On treewidth, separators and Yao’s garbling. In: 19th Theory of Cryptography Conference 2021 . International Association for

تفاصيل العنوان

×
Conference

Limits on the Adaptive Security of Yao’s Garbling ; LCNS

  • Source: Kamath Hosdurg C, Klein K, Pietrzak KZ, Wichs D. Limits on the Adaptive Security of Yao’s Garbling. In: 41st Annual International Cryptology Conference, Part II . Vol

تفاصيل العنوان

×
Conference

Inverse-Sybil attacks in automated contact tracing ; LNCS

  • Source: Auerbach B, Chakraborty S, Klein K, et al. Inverse-Sybil attacks in automated contact tracing. In: Topics in Cryptology – CT-RSA 2021 . Vol 12704. Springer Nature;

تفاصيل العنوان

×
Conference

Adaptively secure proxy re-encryption ; LNCS

  • Source: Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. Adaptively secure proxy re-encryption. In: Vol 11443. Springer Nature; 2019:317-346. doi:

تفاصيل العنوان

×
Conference

Reversible proofs of sequential work ; LNCS

  • Source: Abusalah HM, Kamath Hosdurg C, Klein K, Pietrzak KZ, Walter M. Reversible proofs of sequential work. In: Advances in Cryptology – EUROCRYPT 2019 . Vol 11477. Springer

تفاصيل العنوان

×
  • 1-10 ل  18 نتائج ل ""Klein, Karen""