Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ATM switch buffer management for TCP traffic control., , and . ICCCN, page 193-198. IEEE, (1999)Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field., , , and . ASIACRYPT, volume 1716 of Lecture Notes in Computer Science, page 75-85. Springer, (1999)Non-Malleable Functions and Their Applications., , , , and . IACR Cryptol. ePrint Arch., (2015)Two-Round PAKE from Approximate SPH and Instantiations from Lattices., and . ASIACRYPT (3), volume 10626 of Lecture Notes in Computer Science, page 37-67. Springer, (2017)Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes., , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 303-332. Springer, (2016)Black-Box Separations for One-More (Static) CDH and Its Generalization., , , , and . ASIACRYPT (2), volume 8874 of Lecture Notes in Computer Science, page 366-385. Springer, (2014)Field Identification of Cold Tolerance of High Oleic Acid Peanut at Germination Stage and Verification of Physiological Indices., , , , and . BIBE, page 9:1-9:5. ACM, (2020)Gumbel-Softmax Optimization: A Simple General Framework for Combinatorial Optimization Problems on Graphs., , and . COMPLEX NETWORKS (1), volume 881 of Studies in Computational Intelligence, page 879-890. Springer, (2019)An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 641-651 (2021)A general deep learning framework for network reconstruction and dynamics learning., , , , , , and . Appl. Netw. Sci., 4 (1): 110 (2019)