Author of the publication

All-but-One Dual Projective Hashing and Its Applications.

, , , , , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 181-198. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Practical Limited Identity-Based Encryption Scheme., , and . Fundam. Informaticae, 80 (4): 461-474 (2007)Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic., , , , , , , and . IEEE Trans. Veh. Technol., 68 (6): 5618-5628 (2019)Proxy multi-signature binding positioning protocol., , and . ICCC, page 166-170. IEEE, (2014)New Public Key Authentication Frameworks with Lite Certification Authority., , and . IACR Cryptology ePrint Archive, (2006)Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm., , and . IACR Cryptology ePrint Archive, (2014)New Public Key Cryptosystems Using Polynomials over Non-commutative Rings., , and . IACR Cryptology ePrint Archive, (2007)Efficient Attribute-Based Secure Keyword Search on the Cloud Storage., , , and . IACR Cryptology ePrint Archive, (2017)Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability., and . IACR Cryptology ePrint Archive, (2015)Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication., and . Int. J. Netw. Secur., 3 (1): 35-38 (2006)Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications., , and . Concurr. Comput. Pract. Exp., 28 (4): 1145-1160 (2016)