Author of the publication

A privacy-preserving code-based authentication protocol for Internet of Things.

, , , and . J. Supercomput., 75 (12): 8231-8261 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DAGS: Reloaded Revisiting Dyadic Key Encapsulation., , , , , , , , , and 3 other author(s). IACR Cryptology ePrint Archive, (2018)DAGS: Key encapsulation using dyadic GS codes., , , , , , , , , and 3 other author(s). J. Math. Cryptol., 12 (4): 221-239 (2018)Quasi-Dyadic Girault Identification Scheme., , , and . C2SI, volume 11445 of Lecture Notes in Computer Science, page 307-321. Springer, (2019)DAGS: Reloaded Revisiting Dyadic Key Encapsulation., , , , , , , , , and 3 other author(s). CBC, volume 11666 of Lecture Notes in Computer Science, page 69-85. Springer, (2019)DAGS: Key Encapsulation using Dyadic GS Codes., , , , , , , , , and 3 other author(s). IACR Cryptology ePrint Archive, (2017)A privacy-preserving code-based authentication protocol for Internet of Things., , , and . J. Supercomput., 75 (12): 8231-8261 (2019)