Cited By
View all- Fischlin MMeng WJensen CCremers CKirda E(2023)Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623099(2901-2914)Online publication date: 15-Nov-2023
- Wang YChen RHuang XYung M(2023)Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic ConstructionsAdvances in Cryptology – ASIACRYPT 202310.1007/978-981-99-8736-8_5(135-167)Online publication date: 4-Dec-2023
- Abdolmaleki BFleischhacker NGoyal VJain AMalavolta G(2022)Steganography-Free Zero-KnowledgeTheory of Cryptography10.1007/978-3-031-22318-1_6(143-172)Online publication date: 7-Nov-2022
- Show More Cited By