Saqib A. Kakvi
Saqib A. Kakvi
Verified email at - Homepage
Cited by
Cited by
Optimal security proofs for full domain hash, revisited
SA Kakvi, E Kiltz
Annual International Conference on the Theory and Applications of …, 2012
Tightly-secure signatures from chameleon hash functions
O Blazy, SA Kakvi, E Kiltz, J Pan
IACR International Workshop on Public Key Cryptography, 256-279, 2015
How to build time-lock encryption
J Liu, T Jager, SA Kakvi, B Warinschi
Designs, Codes and Cryptography 86 (11), 2549-2586, 2018
Certifying RSA
SA Kakvi, E Kiltz, A May
International Conference on the Theory and Application of Cryptology and …, 2012
Efficient fully anonymous group signatures based on the Groth group signature scheme
SA Kakvi
Masters thesis, University College London, 2010. http://www5. rz. rub. de …, 2010
On the security of the PKCS# 1 v1. 5 signature scheme
T Jager, SA Kakvi, A May
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Offline witness encryption with semi-adaptive security
P Chvojka, T Jager, SA Kakvi
International Conference on Applied Cryptography and Network Security, 231-250, 2020
On the Security of RSA-PSS in the Wild
SA Kakvi
Proceedings of the 5th ACM Workshop on Security Standardisation Research …, 2019
Reinforcement Learning for Blackjack
SA Kakvi
International Conference on Entertainment Computing, 300-301, 2009
On the improvement of security proofs
SA Kakvi
Skipping the g in Group Signatures
O Blazy, SA Kakvi
The system can't perform the operation now. Try again later.
Articles 1–11