From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Concurrent Knowledge Extraction in Public-Key Models., , и . J. Cryptol., 29 (1): 156-219 (2016)Practical Constant-Size Ring Signature., , и . J. Comput. Sci. Technol., 33 (3): 533-541 (2018)Deniable Internet Key-Exchange., , , и . IACR Cryptology ePrint Archive, (2007)Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15., и . IACR Cryptology ePrint Archive, (2016)A New Framework for RFID Privacy., , , , и . IACR Cryptology ePrint Archive, (2010)Aggregation of Gamma-Signatures and Applications to Bitcoin.. IACR Cryptology ePrint Archive, (2018)Interactive Zero-Knowledge with Restricted Random Oracles., и . TCC, том 3876 из Lecture Notes in Computer Science, стр. 21-40. Springer, (2006)Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage., и . ProvSec, том 6980 из Lecture Notes in Computer Science, стр. 348-365. Springer, (2011)Computationally-Fair Group and Identity-Based Key-Exchange., и . TAMC, том 7287 из Lecture Notes in Computer Science, стр. 237-247. Springer, (2012)Reduction Zero-Knowledge., , , и . SCN, том 2576 из Lecture Notes in Computer Science, стр. 303-317. Springer, (2002)