From post

Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles.

, и . ACNS, том 7954 из Lecture Notes in Computer Science, стр. 458-474. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , и . IWSEC, том 6434 из Lecture Notes in Computer Science, стр. 164-180. Springer, (2010)Strongly secure authenticated key exchange from factoring, codes, and lattices., , , и . Des. Codes Cryptogr., 76 (3): 469-504 (2015)Secure distributed constraint satisfaction: reaching agreement without revealing private information., , и . Artif. Intell., 161 (1-2): 229-245 (2005)RFID privacy issues and technical challenges., , и . Commun. ACM, 48 (9): 66-71 (2005)M+1-st Price Auction Using Homomorphic Encryption., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (1): 136-141 (2003)Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices., , , и . IACR Cryptol. ePrint Arch., (2012)Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (6): 1345-1355 (2014)Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys., и . ICISC, том 7259 из Lecture Notes in Computer Science, стр. 490-509. Springer, (2011)Revocable Hierarchical Identity-Based Authenticated Key Exchange., , , , , и . ICISC, том 13218 из Lecture Notes in Computer Science, стр. 3-27. Springer, (2021)Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts., , , и . Public Key Cryptography, том 5443 из Lecture Notes in Computer Science, стр. 215-234. Springer, (2009)