Author of the publication

Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme.

, , , and . Cryptogr. Commun., 8 (4): 579-591 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reset-Secure Identity-Based Identification Schemes Without Pairings., , and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 227-246. Springer, (2015)Improving Signature Schemes with Tight Security Reductions., , and . ISPEC, volume 11879 of Lecture Notes in Computer Science, page 273-292. Springer, (2019)ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism., , and . Symmetry, 13 (9): 1640 (2021)A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures., , and . Symmetry, 13 (8): 1330 (2021)A Review of Cryptographic Electronic Voting., , and . Symmetry, 14 (5): 858 (2022)Evaluating Pairing-Free Identity-Based Identification Using Curve25519., , and . ACeS, volume 1347 of Communications in Computer and Information Science, page 179-193. Springer, (2020)Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API., , and . ICITST, page 1-4. IEEE, (2020)Easy Simple Factoring-based Digital Signature Scheme., , , and . ICITST, page 1-4. IEEE, (2020)On the security of a modified Beth identity-based identification scheme., , , and . Inf. Process. Lett., 113 (14-16): 580-583 (2013)An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model., , , and . KSII Trans. Internet Inf. Syst., 7 (4): 910-922 (2013)