Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can We Securely Use CBC Mode in TLS1.0?, , and . ICT-EurAsia/CONFENIS, volume 9357 of Lecture Notes in Computer Science, page 151-160. Springer, (2015)Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 189-194 (2005)Generic Fully Simulatable Adaptive Oblivious Transfer., , and . ACNS, volume 6715 of Lecture Notes in Computer Science, page 274-291. (2011)A Storage Efficient Redactable Signature in the Standard Model., , , and . ISC, volume 5735 of Lecture Notes in Computer Science, page 326-337. Springer, (2009)Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing., , , , , and . CoRR, (2016)Simple Adaptive Oblivious Transfer without Random Oracle., and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 334-346. Springer, (2009)Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions., , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 235-246. Springer, (2012)Membership Privacy for Asynchronous Group Messaging., , , , and . WISA, volume 13720 of Lecture Notes in Computer Science, page 131-142. Springer, (2022)Differential Private (Random) Decision Tree Without Adding Noise., and . ICONIP (9), volume 1963 of Communications in Computer and Information Science, page 162-174. Springer, (2023)Cryptographically Secure Bloom-Filters., and . Trans. Data Priv., 2 (2): 131-139 (2009)