Author of the publication

Certificate Authority using Multiple Signing Keys against Signature Scheme Compromised.

, , and . CCCT (1), page 52-56. The International Institute of Informatics and Systemics (IIIS), (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a Hybrid Wavelength Selective Crossconnect Utilizing a Silicon Optical Switch Array., , , , , and . OECC/PSC, page 1-4. IEEE, (2022)Efficient Sealed-Bid Auction Using Hash Chain., , and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 183-191. Springer, (2000)Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison., , and . ISC, volume 2200 of Lecture Notes in Computer Science, page 408-419. Springer, (2001)An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 87-A (1): 173-181 (2004)Best Differential Characteristic Search of FEAL., , and . FSE, volume 1267 of Lecture Notes in Computer Science, page 41-53. Springer, (1997)Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic., , , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 176-189. Springer, (1999)Certificate Authority using Multiple Signing Keys against Signature Scheme Compromised., , and . CCCT (1), page 52-56. The International Institute of Informatics and Systemics (IIIS), (2004)