Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform.. AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 41-58. Springer, (2011)Mediated Traceable Anonymous Encryption., , and . LATINCRYPT, volume 6212 of Lecture Notes in Computer Science, page 40-60. Springer, (2010)Tracing Malicious Proxies in Proxy Re-encryption., and . Pairing, volume 5209 of Lecture Notes in Computer Science, page 332-353. Springer, (2008)Universally Convertible Directed Signatures., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 682-701. Springer, (2005)Adaptive-ID Secure Revocable Identity-Based Encryption., and . CT-RSA, volume 5473 of Lecture Notes in Computer Science, page 1-15. Springer, (2009)Time-Selective Convertible Undeniable Signatures., and . CT-RSA, volume 3376 of Lecture Notes in Computer Science, page 154-171. Springer, (2005)Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting., and . Comput. J., 62 (8): 1194-1213 (2019)Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things".. IEEE Internet Things J., 7 (11): 11327-11329 (2020)Hardware security without secure hardware: How to decrypt with a password and a server., , , , , and . Theor. Comput. Sci., (2021)Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions., , and . Algorithmica, 83 (1): 72-115 (2021)