Author of the publication

Computationally-Fair Group and Identity-Based Key-Exchange.

, and . IACR Cryptology ePrint Archive, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discrete and continuous min-energy schedules for variable voltage processors., , and . Proc. Natl. Acad. Sci. USA, 103 (11): 3983-3987 (2006)Protocols for secure computations. Foundations of Computer Science, 1982. SFCS'08. 23rd Annual Symposium on, page 160--164. IEEE, (1982)Digital Signatures from Challenge-Divided Sigma-Protocols., and . IACR Cryptology ePrint Archive, (2012)Adaptive Concurrent Non-Malleability with Bare Public-Keys., , and . IACR Cryptology ePrint Archive, (2010)A New Framework for RFID Privacy., , , , and . IACR Cryptology ePrint Archive, (2010)Computationally-Fair Group and Identity-Based Key-Exchange., and . TAMC, volume 7287 of Lecture Notes in Computer Science, page 237-247. Springer, (2012)Tight Approximation Ratio of a General Greedy Splitting Algorithm for the Minimum k-Way Cut Problem, , and . CoRR, (2008)A system capable of verifiably and privately screening global DNA synthesis., , , , , , , , , and 20 other author(s). CoRR, (2024)A New Family of Practical Non-Malleable Protocols., and . IACR Cryptology ePrint Archive, (2011)The Turing Computational Model., , , , and . ACM-TURING, page 8:1. ACM, (2012)