Author of the publication

Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates.

, and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 75-80. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature., , , and . Frontiers Comput. Sci., 14 (4): 144806 (2020)Revised Fischlin's (Blind) Signature Schemes.. CIS (2), volume 3802 of Lecture Notes in Computer Science, page 96-103. Springer, (2005)Ciphertext-Auditable Identity-Based Encryption., , , and . Int. J. Netw. Secur., 17 (1): 23-28 (2015)Fully private auctions for the highest bid., , and . ACM TUR-C, page 64:1-64:6. ACM, (2019)Threshold reusable fuzzy extractor and an application to joint access control via biometric information., , and . Inf. Sci., (2021)A New Hard-Core Predicate of Paillier's Trapdoor Function., and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 263-271. Springer, (2009)The Variant of Remote Set Problem on Lattices., , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 124-133. Springer, (2016)The Security of Individual Bit for XTR., , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 87-98. Springer, (2016)Improved Security Proof for Modular Exponentiation Bits., , and . NSS, volume 9955 of Lecture Notes in Computer Science, page 509-516. Springer, (2016)The Security of Polynomial Information of Diffie-Hellman Key., and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 71-81. Springer, (2015)