Forward secrecy of SPAKE2 J Becerra, D Ostrev, M Škrobot Provable Security: 12th International Conference, ProvSec 2018, Jeju, South …, 2018 | 25 | 2018 |
Tightly-secure pak (e) J Becerra, V Iovino, D Ostrev, P Šala, M Škrobot Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018 | 12 | 2018 |
An offline dictionary attack against zkpake protocol J Becerra, PYA Ryan, P Šala, M Škrobot Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018 | 11 | 2018 |
Honeypakes J Becerra, PB Rønne, PYA Ryan, P Sala Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March …, 2018 | 8 | 2018 |
On the Relation Between SIM and IND-RoR Security Models for PAKEs J Becerra, V Iovino, D Ostrev, M Skrobot Cryptology ePrint Archive, 2017 | 3 | 2017 |
On the relation between SIM and IND-RoR security models for PAKEs JM Lopez Becerra, V Iovino, D Ostrev, M Skrobot SECRYPT 2017, 2017 | 3 | 2017 |
Studying boardroom e-voting schemes: Usability and trust D Khader, R McCall, JM Lopez Becerra SnT, 2013 | 3 | 2013 |
On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy J Becerra, V Iovino, D Ostrev, M Škrobot E-Business and Telecommunications: 14th International Joint Conference …, 2019 | 1 | 2019 |
Provable Security Analysis for the Password Authenticated Key Exchange Problem JM Lopez Becerra Unilu-University of Luxembourg, Esch-Uelzecht, Luxembourg, 2019 | | 2019 |
An offline dictionary attack against zkPAKE protocol JM Lopez Becerra, P Ryan, P Sala, M Skrobot 34th IFIP TC-11 SEC 2019 International Conference on Information Security …, 2019 | | 2019 |
On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy J Becerra, V Iovino, D Ostrev, M Škrobot E-Business and Telecommunications: 14th International Joint Conference …, 2019 | | 2019 |
POSTER: An O line Dictionary A ack against zkPAKE Protocol J Becerra, PYA Ryan, P Šala, M Škrobot | | 2018 |
Tightly-Secure PAK (E) JM Lopez Becerra, V Iovino, D Ostrev, P Sala, M Skrobot Cryptology and Network Security, 2017 | | 2017 |