Author of the publication

On the Relationship among Cryptographic Physical Assumptions.

. ISAAC, volume 762 of Lecture Notes in Computer Science, page 369-378. Springer, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unified Paradigm of Organized Complexity and Semantic Information Theory.. CoRR, (2016)Resource Bounded Unprovability of Computational Lower Bounds., and . IACR Cryptology ePrint Archive, (2003)How to Utilize the Randomness of Zero-Knowledge Proofs., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 456-475. Springer, (1990)Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security., , and . IWSEC, volume 7631 of Lecture Notes in Computer Science, page 216-232. Springer, (2012)Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol., , and . TCC, volume 8349 of Lecture Notes in Computer Science, page 343-367. Springer, (2014)Hierarchical Predicate Encryption for Inner-Products., and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 214-231. Springer, (2009)A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme., and . ASIACRYPT, volume 739 of Lecture Notes in Computer Science, page 139-148. Springer, (1991)Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption., , and . ASIACRYPT (2), volume 11273 of Lecture Notes in Computer Science, page 640-672. Springer, (2018)An electronic voting scheme.. IFIP World Conference on IT Tools, page 21-30. Chapman & Hall, (1996)On Key Distribution and Authentication in Mobile Radio Networks., , , and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 461-465. Springer, (1993)