From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient Decoding of Goppa Codes for the McEliece Cryptosystem., , и . Fundam. Informaticae, 133 (4): 387-397 (2014)Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)., , , , , , и . IMACC, том 2260 из Lecture Notes in Computer Science, стр. 114-127. Springer, (2001)On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols., , , и . Fundam. Informaticae, 188 (2): 91-101 (2022)Remark on Shao et al.'s Bidirectional Proxy Re-signature Scheme in Indocrypt'07., , и . Int. J. Netw. Secur., 9 (1): 8-11 (2009)Analysis of Privacy-Preserving Element Reduction of Multiset., , , , и . IACR Cryptology ePrint Archive, (2006)On the Non-repudiation of Isogeny Based Signature Scheme., , и . WISTP, том 11469 из Lecture Notes in Computer Science, стр. 63-77. Springer, (2018)Analysis on Yu et al.'s dynamic algorithm for canonic DBC., , , и . Discret. Appl. Math., (2021)A Generalized Takagi-Cryptosystem with a modulus of the form prqs., , , и . INDOCRYPT, том 1977 из Lecture Notes in Computer Science, стр. 283-294. Springer, (2000)Prime Numbers of Diffie-Hellman Groups for IKE-MODP., , , и . INDOCRYPT, том 2904 из Lecture Notes in Computer Science, стр. 228-234. Springer, (2003)New orthogonality criterion for shortest vector of lattices and its applications., , , и . Discret. Appl. Math., (2020)