Author of the publication

Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server.

, , , and . CCSW, page 17-28. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semidirect Product Key Exchange: the State of Play., , and . IACR Cryptol. ePrint Arch., (2023)Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)., , , and . J. Math. Cryptol., 14 (1): 438-459 (2020)Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server., , , and . CCSW, page 17-28. ACM, (2017)Cryptanalysis of protocols using (Simultaneous) Conjugacy Search Problem in certain Metabelian Platform Groups., , , , and . CoRR, (2023)Publicly Verifiable Secret Sharing Using Non-Abelian Groups., and . CoRR, (2014)Solving the Conjugacy Decision Problem via Machine Learning., , and . CoRR, (2017)Solving the Conjugacy Decision Problem via Machine Learning., , and . Experimental Mathematics, 29 (1): 66-78 (2020)The status of polycyclic group-based cryptography: A survey and open problems., and . Groups Complexity Cryptology, 8 (2): 171-186 (2016)Medical Diagnostics Based on Encrypted Medical Data., , , , , , and . BICT, volume 289 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 98-111. Springer, (2019)Secure and Efficient Delegation of Elliptic-Curve Pairing., , , and . ACNS (1), volume 12146 of Lecture Notes in Computer Science, page 45-66. Springer, (2020)