Author of the publication

On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs.

, , , , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 237-253. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A synoptic assessment of the summer extreme rainfall over the middle reaches of Yangtze River in CMIP5 models, , , , , and . Climate Dynamics, (May 11, 2019)Study on conservation planning for beijing old city based on RS and GIS., , , , and . IGARSS, page 1488-1491. IEEE, (2005)Compositional time Petri nets and reduction rules., , and . IEEE Trans. Syst. Man Cybern. Part B, 30 (4): 562-572 (2000)KDM security for identity-based encryption: Constructions and separations., , , and . Inf. Sci., (2019)KDM Security for Identity-Based Encryption: Constructions and Separations., , , and . IACR Cryptol. ePrint Arch., (2016)Non-Malleable Functions and Their Applications., , , , and . IACR Cryptol. ePrint Arch., (2015)Causal Discovery for Climate Research Using Graphical Models, and . Journal of Climate, 25 (17): 5648 - 5665 (2012)A novel approach to public-coin concurrent zero-knowledge and applications on resettable security., and . Sci. China Inf. Sci., 62 (3): 32110:1-32110:14 (2019)A Combined Method for Analog Circuit Fault Diagnosis Based on Dependence Matrices and Intelligent Classifiers., , , and . IEEE Trans. Instrumentation and Measurement, 69 (3): 782-793 (2020)Applying Aspect-Orientation in Designing Security Systems: A Case Study., , , , , and . SEKE, page 360-365. (2004)