From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers., , , , и . ASIACRYPT (1), том 10031 из Lecture Notes in Computer Science, стр. 455-483. (2016)Embedded Built-In-Test Detection Circuit for Radio Frequency Systems and Circuits., и . DDECS, стр. 89-90. IEEE Computer Society, (2006)A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT., и . IACR Cryptology ePrint Archive, (2016)A distinguisher on PRESENT-like permutations with application to SPONGENT., и . Sci. China Inf. Sci., 60 (7): 72101 (2017)A Secure Threshold Signature Scheme from Lattices., , и . CIS, стр. 469-473. IEEE Computer Society, (2013)An Attribute-Based Encryption Scheme Secure against Malicious KGC., , и . TrustCom, стр. 1376-1380. IEEE Computer Society, (2012)A Certificateless Signature and Group Signature Schemes against Malicious PKG., и . AINA, стр. 334-341. IEEE Computer Society, (2008)Beyond-birthday security for permutation-based Feistel networks., и . Des. Codes Cryptogr., 89 (3): 407-440 (2021)A Generic Construction for Proxy Cryptography.. CSEE (1), том 214 из Communications in Computer and Information Science, стр. 284-289. Springer, (2011)A General Construction for Multi-authority Attribute-Based Encryption.. AICI, том 7530 из Lecture Notes in Computer Science, стр. 333-340. Springer, (2012)