From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

RFID privacy issues and technical challenges., , и . Commun. ACM, 48 (9): 66-71 (2005)Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups., , , и . CRYPTO (1), том 8616 из Lecture Notes in Computer Science, стр. 241-260. Springer, (2014)A Length-Invariant Hybrid Mix., и . ASIACRYPT, том 1976 из Lecture Notes in Computer Science, стр. 178-191. Springer, (2000)Double-trapdoor anonymous tags for traceable signatures., , , и . Int. J. Inf. Sec., 12 (1): 19-31 (2013)Non-Interactive Composition of Sigma-Protocols via Share-then-Hash., , , , и . IACR Cryptol. ePrint Arch., (2021)The Limits of Composable Crypto with Transferable Setup Devices., , и . AsiaCCS, стр. 381-392. ACM, (2015)Opcount: A Pseudo-Code Performance Estimation System for Pairing-Based Cryptography., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (9): 1285-1292 (2019)Non-interactive Composition of Sigma-Protocols via Share-then-Hash., , , , и . ASIACRYPT (3), том 12493 из Lecture Notes in Computer Science, стр. 749-773. Springer, (2020)On the Definition of Anonymity for Ring Signatures., и . VIETCRYPT, том 4341 из Lecture Notes in Computer Science, стр. 157-174. Springer, (2006)Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures., , , и . TCC, том 8349 из Lecture Notes in Computer Science, стр. 688-712. Springer, (2014)