Author of the publication

Bit-Slice Auction Circuit.

, and . ESORICS, volume 2502 of Lecture Notes in Computer Science, page 24-38. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New combinatorial designs and their applications to authentication codes and secret sharing schemes., , , and . Discret. Math., 279 (1-3): 383-405 (2004)On Claw Free Families., and . ASIACRYPT, volume 739 of Lecture Notes in Computer Science, page 111-123. Springer, (1991)Improvement of UC Secure Searchable Symmetric Encryption Scheme., and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 135-152. Springer, (2015)Provably Secure Convertible Undeniable Signatures with Unambiguity., , and . SCN, volume 6280 of Lecture Notes in Computer Science, page 291-308. Springer, (2010)Stateful identity-based encryption scheme: faster encryption and decryption., , and . AsiaCCS, page 381-388. ACM, (2008)New RSA-Based (Selectively) Convertible Undeniable Signature Schemes., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (1): 63-75 (2010)Undeniable and Unpretendable Signatures., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 138-150 (2012)Divisible Voting Scheme., , and . ISC, volume 2851 of Lecture Notes in Computer Science, page 137-150. Springer, (2003)Optimum Secret Sharing Scheme Secure against Cheating., and . EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 200-211. Springer, (1996)Provably Secure Metering Scheme., and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 388-398. Springer, (2000)