From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation., и . IACR Cryptology ePrint Archive, (2011)Secure Cryptographic Workflow in the Standard Model., и . INDOCRYPT, том 4329 из Lecture Notes in Computer Science, стр. 379-393. Springer, (2006)Random-Oracle Uninstantiability from Indistinguishability Obfuscation., , и . TCC (2), том 9015 из Lecture Notes in Computer Science, стр. 428-455. Springer, (2015)Security of Even-Mansour Ciphers under Key-Dependent Messages., , и . IACR Trans. Symmetric Cryptol., 2017 (2): 84-104 (2017)Robust Encryption, Revisited., , , и . Public Key Cryptography, том 7778 из Lecture Notes in Computer Science, стр. 352-368. Springer, (2013)Efficient Identity-Based Key Encapsulation to Multiple Parties., и . IMACC, том 3796 из Lecture Notes in Computer Science, стр. 428-441. Springer, (2005)Randomness Reuse: Extensions and Improvements., и . IMACC, том 4887 из Lecture Notes in Computer Science, стр. 257-276. Springer, (2007)On the Semantic Security of Functional Encryption Schemes., и . Public Key Cryptography, том 7778 из Lecture Notes in Computer Science, стр. 143-161. Springer, (2013)Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources., , и . CRYPTO (1), том 8616 из Lecture Notes in Computer Science, стр. 188-205. Springer, (2014)Indifferentiable Authenticated Encryption., и . CRYPTO (1), том 10991 из Lecture Notes in Computer Science, стр. 187-220. Springer, (2018)