From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On secure outsourcing of cryptographic computations to cloud., , и . SCC@ASIACCS, стр. 63-68. ACM, (2014)Revisiting Single-Server Algorithms for Outsourcing Modular Exponentiation., и . INDOCRYPT, том 11356 из Lecture Notes in Computer Science, стр. 3-20. Springer, (2018)Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study Using PRINCE., , , и . SPACE, том 10076 из Lecture Notes in Computer Science, стр. 179-193. Springer, (2016)CRT-Based Outsourcing Algorithms for Modular Exponentiations., и . INDOCRYPT, том 10095 из Lecture Notes in Computer Science, стр. 81-98. (2016)Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services., , , и . Int. J. Inf. Comput. Secur., 9 (1/2): 114-129 (2017)Privacy-Preserving Outsourcing Algorithm for Solving Large Systems of Linear Equations., и . SN Comput. Sci., 4 (5): 656 (сентября 2023)ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks., , , и . Cryptogr., 5 (4): 35 (2021)On "Practical and secure outsourcing algorithms for solving quadratic congruences in IoTs" from IEEE IoT journal.. Discret. Appl. Math., (2021)Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT., , и . ISC, том 11060 из Lecture Notes in Computer Science, стр. 250-267. Springer, (2018)Robust message authentication in the context of quantum key distribution., и . Int. J. Inf. Comput. Secur., 18 (3/4): 365-382 (2022)