From post

EKE Meets Tight Security in the Universally Composable Framework.

, , , и . Public Key Cryptography (1), том 13940 из Lecture Notes in Computer Science, стр. 685-713. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Multi-Chain Future of Proof-of-Space., , , , , и . CoRR, (2019)An Empirical Study of SDK Credential Misuse in iOS Apps., , , и . APSEC, стр. 258-267. IEEE, (2018)An extension of secure group communication using key graph., , , , и . Inf. Sci., 176 (20): 3060-3078 (2006)Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin., , и . J. Syst. Softw., 82 (2): 346-354 (2009)An improved dynamic provable data possession model., , и . CCIS, стр. 290-295. IEEE, (2011)Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher., , и . IACR Cryptology ePrint Archive, (2009)Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network., , , , и . ISNN (1), том 5551 из Lecture Notes in Computer Science, стр. 60-67. Springer, (2009)Public key cryptosystems secure against memory leakage attacks., , , и . IET Inf. Secur., 10 (6): 403-412 (2016)Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections., , , , и . IEEE Trans. Mob. Comput., 23 (4): 3309-3327 (апреля 2024)Provably secure three-party password-based authenticated key exchange protocol., и . Inf. Sci., 184 (1): 310-323 (2012)