From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Weak Composite Diffie-Hellman is not Weaker than Factoring, , и . Electron. Colloquium Comput. Complex., (2005)Power Analysis Attacks on MDPL and DRSL Implementations., , и . ICISC, том 4817 из Lecture Notes in Computer Science, стр. 259-272. Springer, (2007)Compact and Secure Design of Masked AES S-Box., , , , и . ICICS, том 4861 из Lecture Notes in Computer Science, стр. 216-229. Springer, (2007)Introducing proxy zero-knowledge proof and utilization in anonymous credential systems., , , и . Secur. Commun. Networks, 6 (2): 161-172 (2013)Rate regions of secret key sharing in a new source model., , и . IET Commun., 5 (4): 443-455 (2011)A traceable optimistic fair exchange protocol., , и . ISCISC, стр. 161-166. IEEE, (2014)Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT., , и . ISCISC, стр. 81-88. IEEE, (2021)Security analysis of an identity-based mix net., , , и . ISCISC, стр. 1-4. IEEE, (2013)A Generic Construction for Verifiable Attribute-based Keyword Search Schemes., , , и . IACR Cryptology ePrint Archive, (2015)Dual-rail transition logic: A logic style for counteracting power analysis attacks., , и . Comput. Electr. Eng., 35 (2): 359-369 (2009)