Results (9)

  • Leftover hash lemma revisited
    Conference paper
  • A leakage resilient mode of operation
    Conference paper
  • Compression from collisions or why CRHF combiners have a long output
    Conference paper
  • Indistinguishability amplification
    Conference paper
  • Composition does not imply adaptive security
    Conference paper
  • Improved security analyses for CBC MACs
    Conference paper