From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Constructing Secure Multi-Party Computation with Identifiable Abort., , , и . IACR Cryptol. ePrint Arch., (2020)Challenges and Opportunities of Cloud Computing -- Trade-off Decisions in Cloud Computing Architecture, , , , , , , и . 2010-19. Karlsruhe Institue of Technology, Faculty of Informatics, (2010)Composable Long-Term Security with Rewinding., , , , , , и . TCC (4), том 14372 из Lecture Notes in Computer Science, стр. 510-541. Springer, (2023)Universally Composable Auditable Surveillance., , , , и . ASIACRYPT (2), том 14439 из Lecture Notes in Computer Science, стр. 453-487. Springer, (2023)Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules., , , , , и . Proc. Priv. Enhancing Technol., 2021 (4): 312-338 (2021)Cryptanalysis of a practical quantum key distribution with polarization-entangled photons., , и . Quantum Inf. Comput., 5 (3): 181-186 (2005)Towards Realising Oblivious Voting., , , , и . ICETE (Selected Papers), том 764 из Communications in Computer and Information Science, стр. 216-240. Springer, (2016)On the problem of authentication in a quantum protocol to detect traffic analysis., и . Quantum Inf. Comput., 3 (1): 48-54 (2003)On Group Key Agreement with Cheater Identification, , и . Western European Workshop on Research in Cryptology, WEWoRC 2005, (2005)And Paper-Based is Better? Towards Comparability of Classic and Cryptographic Voting Schemes., , , , и . IACR Cryptol. ePrint Arch., (2021)