Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability.. TCC (2), volume 9015 of Lecture Notes in Computer Science, page 247-276. Springer, (2015)Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes., , and . EuroPKI, volume 4043 of Lecture Notes in Computer Science, page 81-91. Springer, (2006)CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts., , , and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 35-50. Springer, (2007)Folding Schemes with Selective Verification., and . IACR Cryptol. ePrint Arch., (2022)Guest editorial: Special issue on Mathematics of Zero-Knowledge., , , and . Des. Codes Cryptogr., 91 (11): 3331-3332 (November 2023)Short tightly secure signatures for signing a vector of group elements: A new approach., , and . Theor. Comput. Sci., (2019)Signatures of knowledge for Boolean circuits under standard assumptions., , , and . Theor. Comput. Sci., (2022)On Dynamic Distribution of Private Keys over MANETs., , and . WCAN@ICALP, volume 171 of Electronic Notes in Theoretical Computer Science, page 33-41. Elsevier, (2006)An Algebraic Framework for Diffie-Hellman Assumptions., , , , and . J. Cryptol., 30 (1): 242-288 (2017)Shorter Pairing-Based Arguments Under Standard Assumptions., and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 728-757. Springer, (2019)