Author of the publication

Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology.

, , , , , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tight correlations between forest parameters and backscattering coefficient derived by the L-band airborne SAR (PiSAR)., , , , , , , and . IGARSS, page 2340-2343. IEEE, (2004)How to Simultaneously Exchange Secrets by General Assumptions., and . ACM Conference on Computer and Communications Security, page 184-192. ACM, (1994)Privacy-preserving smart metering with verifiability for both billing and energy management., , , , and . AsiaPKC@AsiaCCS, page 23-32. ACM, (2014)New Message Difference for MD4., , , and . FSE, volume 4593 of Lecture Notes in Computer Science, page 329-348. Springer, (2007)Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions., , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 235-252. Springer, (2014)Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function., , , and . AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 290-307. Springer, (2008)Confirmation that Some Hash Functions Are Not Collision Free., , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 326-343. Springer, (1990)Power Variance Analysis breaks a masked ASIC implementation of AES., , , , and . DATE, page 1059-1064. IEEE Computer Society, (2010)Rigorous Security Requirements for Designated Verifier Signatures., , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 318-335. Springer, (2010)Bit-Free Collision: Application to APOP Attack., , , and . IWSEC, volume 5824 of Lecture Notes in Computer Science, page 3-21. Springer, (2009)