Author of the publication

A note on the strong authenticated key exchange with auxiliary inputs.

, , , , , and . Des. Codes Cryptogr., 85 (1): 175-178 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Server-aided signatures verification secure against collusion attack., , and . Inf. Secur. Tech. Rep., 17 (3): 46-57 (2013)Secure Message Communication Protocol Among Vehicles in Smart City., , , and . IEEE Trans. Vehicular Technology, 67 (5): 4359-4373 (2018)Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03., , and . IACR Cryptology ePrint Archive, (2003)A New Short Signature Scheme Without Random Oracles from Bilinear Pairings., , , and . IACR Cryptology ePrint Archive, (2005)Policy controlled system with anonymity., , and . Theor. Comput. Sci., (2018)Introduction to Security Reduction, , and . Springer, (2018)Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions., , , , and . J. Comput. Sci. Technol., 34 (6): 1366-1379 (2019)Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004., , , and . J. Comput. Sci. Technol., 22 (1): 71-74 (2007)Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms., , , , and . IEEE Internet Things J., 9 (22): 22595-22607 (2022)Public-Key Encryption With Tester Verifiable Equality Test for Cloud Computing., , , and . IEEE Trans. Cloud Comput., 11 (4): 3396-3406 (October 2023)