From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality., , , и . CT-RSA, том 11405 из Lecture Notes in Computer Science, стр. 127-148. Springer, (2019)Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication., , и . J. Cryptol., 20 (1): 115-149 (2007)Double-Authentication-Preventing Signatures in the Standard Model., , и . SCN, том 12238 из Lecture Notes in Computer Science, стр. 338-358. Springer, (2020)Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework., , , и . CT-RSA, том 4964 из Lecture Notes in Computer Science, стр. 335-351. Springer, (2008)Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions., , и . Des. Codes Cryptogr., 86 (10): 2197-2246 (2018)Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings., , , , и . IACR Cryptol. ePrint Arch., (2017)Efficient Network Coding Signatures in the Standard Model., , и . IACR Cryptol. ePrint Arch., (2011)Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures., , и . ASIACRYPT (4), том 13794 из Lecture Notes in Computer Science, стр. 159-188. Springer, (2022)Adaptively Secure Single Secret Leader Election from DDH., , и . PODC, стр. 430-439. ACM, (2022)Efficient Network Coding Signatures in the Standard Model., , и . Public Key Cryptography, том 7293 из Lecture Notes in Computer Science, стр. 680-696. Springer, (2012)