From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication., , и . IACR Cryptology ePrint Archive, (2014)A Server-Assisted Hash-Based Signature Scheme., , и . IACR Cryptology ePrint Archive, (2019)Efficient Quantum-Immune Keyless Signatures with Identity., , и . IACR Cryptology ePrint Archive, (2014)A Blockchain-Assisted Hash-Based Signature Scheme., , и . IACR Cryptology ePrint Archive, (2019)Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees., , и . NordSec, том 8208 из Lecture Notes in Computer Science, стр. 313-320. Springer, (2013)Security Proofs for the BLT Signature Scheme., , и . IACR Cryptology ePrint Archive, (2014)A New Approach to Constructing Digital Signature Schemes (Extended Paper)., , , , и . IACR Cryptology ePrint Archive, (2019)Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world., , и . Int. J. Serv. Technol. Manag., 23 (1/2): 117-130 (2017)A Blockchain-Assisted Hash-Based Signature Scheme., , и . NordSec, том 11252 из Lecture Notes in Computer Science, стр. 138-153. Springer, (2018)Efficient Record-Level Keyless Signatures for Audit Logs., , , и . NordSec, том 8788 из Lecture Notes in Computer Science, стр. 149-164. Springer, (2014)