Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Round PAKE from Approximate SPH and Instantiations from Lattices., and . ASIACRYPT (3), volume 10626 of Lecture Notes in Computer Science, page 37-67. Springer, (2017)Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes., , and . CRYPTO (3), volume 9816 of Lecture Notes in Computer Science, page 303-332. Springer, (2016)Black-Box Separations for One-More (Static) CDH and Its Generalization., , , , and . ASIACRYPT (2), volume 8874 of Lecture Notes in Computer Science, page 366-385. Springer, (2014)KDM Security for Identity-Based Encryption: Constructions and Separations., , , and . IACR Cryptol. ePrint Arch., (2016)On the (Quantum) Random Oracle Methodology: New Separations and More., , , , and . IACR Cryptol. ePrint Arch., (2019)Non-Malleable Functions and Their Applications., , , , and . IACR Cryptol. ePrint Arch., (2015)Restoring latent factors against negative transfer using partial-adaptation nonnegative matrix factorization., , and . CCF Trans. Pervasive Comput. Interact., 2 (1): 42-50 (2020)Field Identification of Cold Tolerance of High Oleic Acid Peanut at Germination Stage and Verification of Physiological Indices., , , , and . BIBE, page 9:1-9:5. ACM, (2020)KDM security for identity-based encryption: Constructions and separations., , , and . Inf. Sci., (2019)Towards Secure Data Distribution Systems in Mobile Cloud Computing., , and . IEEE Trans. Mob. Comput., 16 (11): 3222-3235 (2017)