Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On secure outsourcing of cryptographic computations to cloud., , and . SCC@ASIACCS, page 63-68. ACM, (2014)Revisiting Single-Server Algorithms for Outsourcing Modular Exponentiation., and . INDOCRYPT, volume 11356 of Lecture Notes in Computer Science, page 3-20. Springer, (2018)Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study Using PRINCE., , , and . SPACE, volume 10076 of Lecture Notes in Computer Science, page 179-193. Springer, (2016)ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks., , , and . Cryptogr., 5 (4): 35 (2021)CRT-Based Outsourcing Algorithms for Modular Exponentiations., and . INDOCRYPT, volume 10095 of Lecture Notes in Computer Science, page 81-98. (2016)Privacy-Preserving Outsourcing Algorithm for Solving Large Systems of Linear Equations., and . SN Comput. Sci., 4 (5): 656 (September 2023)Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services., , , and . Int. J. Inf. Comput. Secur., 9 (1/2): 114-129 (2017)On "Practical and secure outsourcing algorithms for solving quadratic congruences in IoTs" from IEEE IoT journal.. Discret. Appl. Math., (2021)Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT., , and . ISC, volume 11060 of Lecture Notes in Computer Science, page 250-267. Springer, (2018)Robust message authentication in the context of quantum key distribution., and . Int. J. Inf. Comput. Secur., 18 (3/4): 365-382 (2022)