Author of the publication

Verifiable Computation of Large Polynomials.

, , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 90-104. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptively Secure Constrained Verifiable Random Function., , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 367-385. Springer, (2023)A Non-interactive Secure Outsourced Computation Scheme in Multi-party Cloud., and . INCoS, page 15-19. IEEE, (2012)Complementary Witness Soundness Witness Indistinguishable Proof System and CCA2 Public-Key Encryption Schemes., , and . INCoS, page 270-278. IEEE, (2012)Local-Variance-Based Attention For Visual Tracking., , , and . ICME, page 1-6. IEEE, (2020)Non-malleable Instance-Dependent Commitment in the Standard Model., , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 450-457. Springer, (2012)A Wireless Implantable Potentiostat for Programmable Electrochemical Drug Delivery., , , , , , , and . BioCAS, page 1-4. IEEE, (2021)Graph Spectral Segmentation of SAR Image Based on Information Similarity Measure., , and . FSKD (4), page 708-711. IEEE Computer Society, (2007)0-7695-2874-0.Secure two-party SM9 signing., , , and . Sci. China Inf. Sci., 63 (8): 1-3 (2020)Pooling Attention-based Encoder-Decoder Network for semantic segmentation., , , , , and . Comput. Electr. Eng., (2021)Pitch in: A Secure Extension Signature Based on SM9., , , and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 87-104. Springer, (2022)