Author of the publication

Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More.

, , and . CT-RSA, volume 7178 of Lecture Notes in Computer Science, page 260-277. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications., , , and . IACR Cryptology ePrint Archive, (2015)Improved Collision Attack on MD5., , , and . IACR Cryptology ePrint Archive, (2005)Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function., , , and . AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 290-307. Springer, (2008)Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes., , and . ISIT, page 3047-3051. IEEE, (2019)Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More., , and . CT-RSA, volume 7178 of Lecture Notes in Computer Science, page 260-277. Springer, (2012)Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound., and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 345-362. Springer, (2014)A Deterministic Algorithm for Computing Divisors in an Interval., , , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 3-12. Springer, (2018)d-Multiplicative Secret Sharing for Multipartite Adversary Structures., and . ITC, volume 163 of LIPIcs, page 2:1-2:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption., , , and . Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, page 71-89. Springer, (2011)How to Generalize RSA Cryptanalyses., and . Public Key Cryptography (2), volume 9615 of Lecture Notes in Computer Science, page 67-97. Springer, (2016)