Author of the publication

Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.

, , and . Cryptography: Policy and Algorithms, volume 1029 of Lecture Notes in Computer Science, page 215-227. Springer, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table., and . VLDB, page 245-254. Morgan Kaufmann, (1984)Concurrent operations in linear hashing., , and . Inf. Sci., 51 (2): 193-211 (1990)Business Agent., , , and . International Conference on Computational Science (1), volume 2329 of Lecture Notes in Computer Science, page 449-457. Springer, (2002)Broadcasting on Incomplete Hypercubes., , and . IEEE Trans. Computers, 42 (11): 1393-1398 (1993)Reaching Fault Diagnosis Agreement under a Hybrid Fault Model., , and . IEEE Trans. Computers, 49 (9): 980-986 (2000)Similarity Retrieval of Iconic Images Based on 2D String Longest Common Subsequence., , and . DASFAA, page 337-341. Dept. of Computer Science, KAIST, P.O. Box 150, ChongRyang, Seoul, 131-650, Korea, (1989)Dynamic Multiprocessor Scheduling for Supporting Real-Time Constraints., , and . ASIAN, volume 1345 of Lecture Notes in Computer Science, page 83-97. Springer, (1997)2d random filter and analysis., and . Int. J. Comput. Math., 42 (1-2): 33-45 (1992)Generalizing the Division Operation on Indefinite Databases., , and . Future Databases, volume 3 of Advanced Database Research and Development Series, page 347-354. World Scientific, Singapore, (1992)On the traffic estimation and engineering of GSM network., , , and . PIMRC, page 1183-1187. (1996)