Author of the publication

Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model.

, , and . IACR Cryptology ePrint Archive, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-Malleable Functions and Their Applications., , , , and . Public Key Cryptography (2), volume 9615 of Lecture Notes in Computer Science, page 386-416. Springer, (2016)An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain., , , , and . IACR Cryptol. ePrint Arch., (2017)Vulnerabilities and Countermeasures - A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid., and . J. Cyber Secur. Mobil., (2012)Unifying Multi-Paradigms in Software System Design., and . Advances in Software Engineering and Knowledge Engineering, volume 2 of Series on Software Engineering and Knowledge Engineering, World Scientific, (1993)On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs., , , , and . IACR Cryptology ePrint Archive, (2012)A Self-Configuring Communication Virtual Machine., , and . ICNSC, page 739-744. IEEE, (2008)A G-Net Model for Knowledge Representation and Reasoning., and . IEEE Trans. Knowl. Data Eng., 2 (3): 295-310 (1990)Dynamic sensory cues shape song structure in Drosophila ., , , , , and . Nature, 507 (7491): 233-237 (2014)Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design Approach., , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 41-54. Springer, (2015)A HyperNet Model for Large Hypertext Systems., and . DASFAA, volume 2 of Advanced Database Research and Development Series, page 484-490. World Scientific, (1991)