From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Non-Malleable Codes with Leakage and Applications to Secure Communication., , , и . CoRR, (2017)On Bringer-Chabanne EPIR Protocol for Polynomial Evaluation, , и . CoRR, (2012)Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters, , , , и . CoRR, (2012)Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields., , , , и . IACR Cryptology ePrint Archive, (2019)Further improvement of factoring N = pr qs with partial known bits., , , и . Adv. in Math. of Comm., 13 (1): 121-135 (2019)The Cycle Structure of LFSR with Arbitrary Characteristic Polynomial over Finite Fields., , , и . CoRR, (2016)Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures., , и . IACR Cryptology ePrint Archive, (2003)Cryptanalysis of LASH., , , , , , и . IACR Cryptology ePrint Archive, (2007)A Dynamic Group Key Distribution Scheme with Flexible User Join., , , и . ICISC, том 2587 из Lecture Notes in Computer Science, стр. 478-496. Springer, (2002)A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances., , и . ICISC, том 2288 из Lecture Notes in Computer Science, стр. 18-31. Springer, (2001)