Author of the publication

Deniable Internet Key Exchange.

, and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 329-348. (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication Complexity and Its Applications.. FAW, volume 5598 of Lecture Notes in Computer Science, page 2. Springer, (2009)Linear Decision Trees: Volume Estimates and Topological Bounds, , and . STOC, page 170-177. ACM, (1992)Security of quantum protocols against coherent measurements.. STOC, page 67-75. ACM, (1995)Concurrent Knowledge Extraction in the Public-Key Model., , and . ICALP (1), volume 6198 of Lecture Notes in Computer Science, page 702-714. Springer, (2010)Quantum Computing: A Great Science in the Making.. TAMC, volume 7287 of Lecture Notes in Computer Science, page 28. Springer, (2012)Graph Design for Secure Multiparty Computation over Non-Abelian Groups., , and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 37-53. Springer, (2008)Separating the Polynomial-Time Hierarchy by Oracles (Preliminary Version). FOCS, page 1-10. IEEE Computer Society, (1985)Near-Optimal Time-Space Tradeoff for Element Distinctness. FOCS, page 91-97. IEEE Computer Society, (1988)FedCM: Federated Learning with Client-level Momentum., , , and . CoRR, (2021)A Note on Universal Composable Zero Knowledge in Common Reference String Model., , and . TAMC, volume 4484 of Lecture Notes in Computer Science, page 462-473. Springer, (2007)