Author of the publication

Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation.

, , and . ICITS, volume 4883 of Lecture Notes in Computer Science, page 183-194. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Verifiable Implicit Asking Protocols for RSA Computation., , , and . AUSCRYPT, volume 718 of Lecture Notes in Computer Science, page 296-307. Springer, (1992)Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis., , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 193-207. Springer, (2001)A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures., , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 259-270. Springer, (1999)A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks., , , , , and . PIMRC, page 1-5. IEEE, (2006)Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application., , , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 495-514. Springer, (2005)Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys., , and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 161-177. Springer, (2006)A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates., and . ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 260-275. Springer, (2004)Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems., , and . ICB, volume 5558 of Lecture Notes in Computer Science, page 806-815. Springer, (2009)Security Weaknesses of Certain Broadcast Encryption Schemes., , and . DRMTICS, volume 3919 of Lecture Notes in Computer Science, page 228-245. Springer, (2005)A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol., , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 444-458. Springer, (2007)