From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE., , , и . Int. J. Netw. Secur., 16 (1): 19-28 (2014)Decimation-Based Fast Correlation Attack., , и . ISIT, стр. 456-460. IEEE, (2007)On Verifiable Implicit Asking Protocols for RSA Computation., , , и . AUSCRYPT, том 718 из Lecture Notes in Computer Science, стр. 296-307. Springer, (1992)Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis., , и . ASIACRYPT, том 2248 из Lecture Notes in Computer Science, стр. 193-207. Springer, (2001)Security Notions for Unconditionally Secure Signature Schemes., , , и . EUROCRYPT, том 2332 из Lecture Notes in Computer Science, стр. 434-449. Springer, (2002)Applying Fujisaki-Okamoto to Identity-Based Encryption., , , , , и . AAECC, том 3857 из Lecture Notes in Computer Science, стр. 183-192. Springer, (2006)Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks., , , и . ICICS, том 1726 из Lecture Notes in Computer Science, стр. 157-168. Springer, (1999)Anonymous Pay-TV System with Secure Revenue Sharing., , , , и . KES (3), том 4694 из Lecture Notes in Computer Science, стр. 984-991. Springer, (2007)Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption., , , и . ICISC, том 5461 из Lecture Notes in Computer Science, стр. 1-19. Springer, (2008)A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures., , и . ISW, том 1729 из Lecture Notes in Computer Science, стр. 259-270. Springer, (1999)