Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (6): 1100-1111 (2013)End-to-End Neural Approaches for Speech Translation. (Approches neurales de bout-en -bout pour la traduction de la parole).. Grenoble Alpes University, France, (2022)An Efficient Two-Phase Ant Colony Optimization Algorithm for the Closest String Problem., , and . SEAL, volume 7673 of Lecture Notes in Computer Science, page 188-197. Springer, (2012)Factoring-Based Proxy Re-Encryption Schemes., , and . ProvSec, volume 8209 of Lecture Notes in Computer Science, page 309-329. Springer, (2013)Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012., , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 277-292. Springer, (2013)Attacks to the Proxy Re-Encryption Schemes from IWSEC2011., , and . IWSEC, volume 8231 of Lecture Notes in Computer Science, page 290-302. Springer, (2013)Coastal Wetland Classification with Deep U-Net Convolutional Networks and Sentinel-2 Imagery: A Case Study at the Tien Yen Estuary of Vietnam., , , , , , , , and . Remote. Sens., 12 (19): 3270 (2020)Proxy Re-Encryption Schemes with Key Privacy from LWE., , , , and . IACR Cryptology ePrint Archive, (2016)Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs., , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 208-222. Springer, (2012)