Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Zhou et al.'s proxy-protected signature schemes., , and . Appl. Math. Comput., 169 (1): 192-197 (2005)Powered Tate Pairing Computation., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (1): 338-341 (2008)Powered Tate Pairing Computation., and . IACR Cryptology ePrint Archive, (2005)Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure in Post-Quantum Cryptography., , , , , and . IACR Cryptol. ePrint Arch., (2023)Security of Lu et al.'s proxy-protected signature scheme., and . Appl. Math. Comput., 169 (2): 1010-1015 (2005)Efficient Delegation of Pairing Computation., , and . IACR Cryptology ePrint Archive, (2005)CAMEO - camera, audio and motion with emotion orchestration for immersive cinematography., and . Advances in Computer Entertainment Technology, volume 352 of ACM International Conference Proceeding Series, page 115-118. ACM, (2008)Cryptanalysis of Some Group-Oriented Proxy Signature Schemes., , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 10-24. Springer, (2005)A New Forward Secure Signature Scheme., , and . IACR Cryptology ePrint Archive, (2004)Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006., and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 686-691. Springer, (2007)