From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields., , , , и . IACR Cryptology ePrint Archive, (2019)Further improvement of factoring N = pr qs with partial known bits., , , и . Adv. in Math. of Comm., 13 (1): 121-135 (2019)A Secure Re-keying Scheme with Key Recovery Property., , и . ACISP, том 2384 из Lecture Notes in Computer Science, стр. 40-55. Springer, (2002)A Dynamic Group Key Distribution Scheme with Flexible User Join., , , и . ICISC, том 2587 из Lecture Notes in Computer Science, стр. 478-496. Springer, (2002)A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances., , и . ICISC, том 2288 из Lecture Notes in Computer Science, стр. 18-31. Springer, (2001)Cryptanalysis of the convex hull click human identification protocol., , , и . Int. J. Inf. Sec., 12 (2): 83-96 (2013)An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data., , и . WISA, том 5379 из Lecture Notes in Computer Science, стр. 145-159. Springer, (2008)Plaintext-Awareness of Hybrid Encryption., и . CT-RSA, том 5985 из Lecture Notes in Computer Science, стр. 57-72. Springer, (2010)Bounds and constructions for key distribution schemes., , , и . Adv. in Math. of Comm., 3 (3): 273-293 (2009)Non-Malleable Codes with Leakage and Applications to Secure Communication., , , и . CoRR, (2017)