Author of the publication

Formal and Precise Analysis of Soundness of Several Shuffling Schemes.

, and . ProvSec, volume 6402 of Lecture Notes in Computer Science, page 133-143. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Evolutions and Stationary Waves for perturbed KdV equation with Nonlocal Term., and . Int. J. Bifurc. Chaos, 12 (11): 2393-2407 (2002)Flexible authentication of images., , and . VCIP, volume 5150 of Proceedings of SPIE, page 1905-1911. SPIE, (2003)A scheme of digital ticket for personal trusted device.. PIMRC, page 3065-3069. IEEE, (2004)Security Remarks on a Convertible Nominative Signature Scheme., and . SEC, volume 232 of IFIP, page 265-275. Springer, (2007)Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce., and . ICC, page 1503-1508. IEEE, (2007)Secure Person-To-Person Communications Based on Biometrics Signals., , and . SEC, volume 181 of IFIP, page 205-222. Springer, (2005)Collusion attack on a multi-key secure video proxy scheme., and . ACM Multimedia, page 380-383. ACM, (2004)Formal and Precise Analysis of Soundness of Several Shuffling Schemes., and . ProvSec, volume 6402 of Lecture Notes in Computer Science, page 133-143. Springer, (2010)Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes.. ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 417-429. Springer, (2004)Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme., , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 171-183. Springer, (2007)