From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adaptively Secure Proxy Re-encryption., , , и . Public Key Cryptography (2), том 11443 из Lecture Notes in Computer Science, стр. 317-346. Springer, (2019)Grafting Key Trees: Efficient Key Management for Overlapping Groups., , , , , , , и . IACR Cryptol. ePrint Arch., (2021)On Treewidth, Separators and Yao's Garbling., , и . TCC (2), том 13043 из Lecture Notes in Computer Science, стр. 486-517. Springer, (2021)Practical Statistically-Sound Proofs of Exponentiation in Any Group., , , , и . CRYPTO (2), том 13508 из Lecture Notes in Computer Science, стр. 370-399. Springer, (2022)Compact Selective Opening Security from LWE., , , , и . Public Key Cryptography (4), том 14604 из Lecture Notes in Computer Science, стр. 127-160. Springer, (2024)Compact Lossy Trapdoor Functions and Selective Opening Security From LWE., , , , и . IACR Cryptol. ePrint Arch., (2023)On the Cost of Adaptivity in Graph-Based Games., , , и . IACR Cryptol. ePrint Arch., (2021)The Cost of Adaptivity in Security Games on Graphs., , , и . TCC (2), том 13043 из Lecture Notes in Computer Science, стр. 550-581. Springer, (2021)Grafting Key Trees: Efficient Key Management for Overlapping Groups., , , , , , , и . TCC (3), том 13044 из Lecture Notes in Computer Science, стр. 222-253. Springer, (2021)CoCoA: Concurrent Continuous Group Key Agreement., , , , , , и . EUROCRYPT (2), том 13276 из Lecture Notes in Computer Science, стр. 815-844. Springer, (2022)