From post

Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.

, , , , и . ISC, том 2851 из Lecture Notes in Computer Science, стр. 151-164. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal., и . ICEIS, стр. 962-967. (2002)Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature, , , и . CoRR, (2006)Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems., , , и . IACR Cryptology ePrint Archive, (2009)Anonymous authentication scheme for XML security standard with Refreshable Tokens., , и . XML Security, стр. 86-93. ACM, (2003)Identity-Based Encryption with Non-Interactive Key Update, , , и . Cryptology ePrint Archive, Report 2004/338, (2004)Image compression using a neural network with learning capability of variable function of a neural unit., , и . VCIP, том 1360 из SPIE Proceedings, SPIE, (1990)Semantic security for the McEliece cryptosystem without random oracles., , , и . Des. Codes Cryptogr., 49 (1-3): 289-305 (2008)Information Security Aspects of Spread Spectrum Systems.. ASIACRYPT, том 917 из Lecture Notes in Computer Science, стр. 193-208. Springer, (1994)Efficient Identity-Based Encryption with Tight Security Reduction., , , , , и . CANS, том 4301 из Lecture Notes in Computer Science, стр. 19-36. Springer, (2006)The Role of Arbiters in Asymmetric Authentication Schemes., , , и . ISC, том 2851 из Lecture Notes in Computer Science, стр. 428-441. Springer, (2003)