From post

A Framework for Unconditionally Secure Public-Key Encryption (with Possible Decryption Errors).

, , и . ICMS, том 10931 из Lecture Notes in Computer Science, стр. 45-54. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Compositions of linear functions and applications to hashing., и . Groups Complexity Cryptology, 8 (2): 155-161 (2016)Generic properties of Whitehead's Algorithm, stabilizers in Aut(Fk) and one-relator groups, , и . CoRR, (2003)A note on fully homomorphic encryption of real-life data., и . Int. J. Comput. Math. Comput. Syst. Theory, 6 (4): 381-385 (2021)Authentication from Matrix Conjugation., и . Groups Complexity Cryptology, 1 (2): 199-205 (2009)Tropical cryptography III: digital signatures., , и . IACR Cryptol. ePrint Arch., (2023)MAKE: a Matrix Action Key Exchange., и . IACR Cryptol. ePrint Arch., (2021)The Centre of a One-Relator Solvable Group., и . Int. J. Algebra Comput., 3 (1): 51-56 (1993)Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups., , , и . ICMS, том 10931 из Lecture Notes in Computer Science, стр. 137-146. Springer, (2018)Using Semidirect Product of (Semi)groups in Public Key Cryptography., и . CiE, том 9709 из Lecture Notes in Computer Science, стр. 132-141. Springer, (2016)Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation., , , и . CNS, стр. 531-539. IEEE, (2017)