Author of the publication

Compact Ring Signatures with Post-Quantum Security in Standard Model.

, , , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 65-84. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On digital signatures based on isomorphism problems: QROM security and ring signatures., , , , , and . IACR Cryptol. ePrint Arch., (2022)A Multi-layer Model for Website Defacement Detection., and . SoICT, page 508-513. ACM, (2019)Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures., and . Computers, 8 (2): 35 (2019)Compact Ring Signatures with Post-Quantum Security in Standard Model., , , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 65-84. Springer, (2023)Efficient Unique Ring Signature for Blockchain Privacy Protection., , , , , , , and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 391-407. Springer, (2021)Efficient Unique Ring Signatures from Lattices., , , , , , , and . ESORICS (2), volume 13555 of Lecture Notes in Computer Science, page 447-466. Springer, (2022)