Results (10)

  • Inverted leftover hash lemma
    Conference paper
  • Towards practical attacks on Argon2i and balloon hashing
    Conference paper
  • Secret-key cryptography from ideal primitives: A systematic verview
    Conference paper
  • Optimality of non-adaptive strategies: The case of parallel games
    Conference paper
  • Cryptographically enforced RBAC
    Conference paper
  • Leakage resilient cryptography
    Conference paper
  • Intrusion resilient secret sharing
    Conference paper