关注
Jordan Ethan
Jordan Ethan
CISPA Helmholtz Center for Information Security
在 cispa.de 的电子邮件经过验证
标题
引用次数
引用次数
年份
Subverting Telegram's End-to-End Encryption
BM Cogliati, J Ethan, A Jha
CISPA, 2023
62023
CTET+: A beyond-birthday-bound secure tweakable enciphering scheme using a single pseudorandom permutation
B Cogliati, J Ethan, V Lallemand, B Lee, J Lee, M Minier
IACR Transactions on Symmetric Cryptology, 1-35, 2021
42021
Context-Committing Security of Leveled Leakage-Resilient AEAD
C Dhar, J Ethan, R Jejurikar, M Khairallah, E List, S Mandal
IACR Transactions on Symmetric Cryptology 2024 (2), 348-370, 2024
32024
On quantum secure compressing pseudorandom functions
R Bhaumik, B Cogliati, J Ethan, A Jha
International Conference on the Theory and Application of Cryptology and …, 2023
22023
Mind the Bad Norms: Revisiting Compressed Oracle-based Quantum Indistinguishability Proofs
R Bhaumik, B Cogliati, J Ethan, A Jha
Cryptology ePrint Archive, 2024
2024
On the Number of Restricted Solutions to Constrained Systems and their Applications
B Cogliati, J Ethan, A Jha, M Nandi, A Saha
Cryptology ePrint Archive, 2024
2024
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing
B Cogliati, J Ethan, A Jha, SK Saha
IACR Transactions on Symmetric Cryptology 2023 (4), 330-364, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–7