Author of the publication

HIMMO: a collusion-resistant identity-based scheme for symmetric key generation.

, , , , and . ACM Commun. Comput. Algebra, 49 (1): 19 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HIMMO: a collusion-resistant identity-based scheme for symmetric key generation., , , , and . ACM Commun. Comput. Algebra, 49 (1): 19 (2015)Linear transform for simultaneous diagonalization of covariance and perceptual metric matrix in image coding., , and . Pattern Recognit., 36 (8): 1799-1811 (2003)On the linear and nonlinear complexity profile of nonlinear pseudorandom number generators., , and . IEEE Trans. Inf. Theory, 49 (1): 60-64 (2003)Exponential sums of nonlinear congruential pseudorandom number generators with Rédei functions., and . Finite Fields Their Appl., 14 (2): 410-416 (2008)Power Quality Factor for Networks Supplying Unbalanced Nonlinear Loads., , , , , and . IEEE Trans. Instrum. Meas., 57 (6): 1268-1274 (2008)Recovering wavelet relations using SVM for image denoising., , , and . ICIP, page 541-544. IEEE, (2008)Perceptual regularization functionals for natural image restoration., , and . ICIP (2), page 989-992. IEEE, (2003)Predicting the Inversive Generator., , , and . IMACC, volume 2898 of Lecture Notes in Computer Science, page 264-275. Springer, (2003)Set Descriptors for Visual Evaluation of Human Corneal Endothelia., , and . Comput. Vis. Image Underst., 84 (2): 249-263 (2001)Multidimensional arrays with maximal linear complexity., , , and . IWSDA, page 10-14. IEEE, (2015)