Author of the publication

Speeding Up Secret Computations with Insecure Auxiliary Devices.

, , and . CRYPTO, volume 403 of Lecture Notes in Computer Science, page 497-506. Springer, (1988)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error-correcting codes and cryptography., and . Appl. Algebra Eng. Commun. Comput., 19 (3): 213-228 (2008)Unconditionally Secure Anonymous Encryption and Group Authentication., , , and . Comput. J., 49 (3): 310-321 (2006)An improvement of discrete Tardos fingerprinting codes., , , , , , and . IACR Cryptology ePrint Archive, (2008)On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?, , , and . IACR Cryptology ePrint Archive, (2003)Relation between XL algorithm and Gröbner Bases Algorithms., , and . IACR Cryptology ePrint Archive, (2004)CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project)., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Formally verifiable features in embedded vehicular security systems., , , , , and . VNC, page 1-7. IEEE, (2009)On advanced cryptographic techniques for information security of smart grid AMI., , , , and . CSIIRW, page 64. ACM, (2011)Protocols for purpose-restricted anonymous communications in IP-based wireless networks., , , and . Comput. Commun., 31 (15): 3662-3671 (2008)LDPC codes with fixed initialization decoding over binary symmetric channel., , and . ISIT, page 784-788. IEEE, (2010)