From post

Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications.

, , и . ACISP, том 12248 из Lecture Notes in Computer Science, стр. 664-673. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Gnocchi: Multiplexed Payment Channels for Cryptocurrencies., , , , , , и . NSS, том 11928 из Lecture Notes in Computer Science, стр. 488-503. Springer, (2019)Privacy-Preserving Authenticated Key Exchange in the Standard Model., , , и . ASIACRYPT (3), том 13793 из Lecture Notes in Computer Science, стр. 210-240. Springer, (2022)xVMP: An LLVM-based Code Virtualization Obfuscator., , , и . SANER, стр. 738-742. IEEE, (2023)An improved dynamic provable data possession model., , и . CCIS, стр. 290-295. IEEE, (2011)Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network., , , , и . ISNN (1), том 5551 из Lecture Notes in Computer Science, стр. 60-67. Springer, (2009)An Empirical Study of SDK Credential Misuse in iOS Apps., , , и . APSEC, стр. 258-267. IEEE, (2018)Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin., , и . J. Syst. Softw., 82 (2): 346-354 (2009)Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks., , , , , , , , и . KSII Trans. Internet Inf. Syst., 12 (7): 3421-3437 (2018)Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections., , , , и . IEEE Trans. Mob. Comput., 23 (4): 3309-3327 (апреля 2024)New algorithms for verifiable outsourcing of bilinear pairings., , , , и . Sci. China Inf. Sci., 59 (9): 99103 (2016)