Results (11)

  • Key derivation without entropy waste
    Conference paper
  • Simple chosen-ciphertext security from low noise LPN
    Conference paper
  • How to fake auxiliary input
    Conference paper
  • Policy-based signatures
    Conference paper
  • The exact PRF-security of NMAC and HMAC
    Conference paper
  • Optimality of non-adaptive strategies: The case of parallel games
    Conference paper
  • Constrained Verifiable Random Functions
    Conference paper
  • Adaptive security of constrained PRFs
    Conference paper