From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings.. IACR Cryptology ePrint Archive, (2002)Pairing Lattices.. Pairing, том 5209 из Lecture Notes in Computer Science, стр. 18-38. Springer, (2008)Hyperelliptic Pairings., , и . Pairing, том 4575 из Lecture Notes in Computer Science, стр. 108-131. Springer, (2007)Computing Riemann-Roch Spaces in Algebraic Function Fields and Related Topics.. J. Symb. Comput., 33 (4): 425-445 (2002)An Algorithm for Computing Isomorphisms of Algebraic Function Fields.. ANTS, том 3076 из Lecture Notes in Computer Science, стр. 263-271. Springer, (2004)Extending the GHS Weil Descent Attack., , и . EUROCRYPT, том 2332 из Lecture Notes in Computer Science, стр. 29-44. Springer, (2002)Optimised Versions of the Ate and Twisted Ate Pairings., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (7): 1660-1667 (2009)Generalized Teacher Forcing for Learning Chaotic Dynamics., , , и . ICML, том 202 из Proceedings of Machine Learning Research, стр. 13017-13049. PMLR, (2023)Tractable Dendritic RNNs for Reconstructing Nonlinear Dynamical Systems., , , , , , и . ICML, том 162 из Proceedings of Machine Learning Research, стр. 2292-2320. PMLR, (2022)Generalised Jacobians in Cryptography and Coding Theory.. WAIFI, том 7369 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2012)