From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

(Hierarchical Identity-Based) Threshold Ring Signatures., и . IACR Cryptology ePrint Archive, (2006)Tight Reductions among Strong Di e-Hellman Assumptions.. IACR Cryptology ePrint Archive, (2005)Fast and Proven Secure Blind Identity-Based Signcryption from Pairings., и . IACR Cryptology ePrint Archive, (2004)Ring Signatures without Random Oracles., , , и . IACR Cryptology ePrint Archive, (2005)Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups., , и . IACR Cryptology ePrint Archive, (2004)Teaching for Conceptual Change in Security Awareness., и . IEEE Secur. Priv., 6 (6): 67-69 (2008)On the Svanström bound for ternary constant-weight codes., , , и . IEEE Trans. Inf. Theory, 47 (5): 2061-2064 (2001)elf-Complementary Balanced Codes and Quasi-Symmetric Designs., и . Des. Codes Cryptogr., 27 (3): 271-279 (2002)Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups., , , и . ESAS, том 3313 из Lecture Notes in Computer Science, стр. 82-94. Springer, (2004)On the constructions of highly nonlinear zigzag functions and unbiased functions., , и . Inf. Process. Lett., 79 (3): 135-140 (2001)