Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Timed-Release Key Management Scheme for Backward Recovery., , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 3-14. Springer, (2005)Software Implementation of an Attribute-Based Encryption Scheme., , , , , and . IEEE Trans. Computers, 64 (5): 1429-1441 (2015)Privacy-preserving search for chemical compound databases., , , , , , , , , and 1 other author(s). BMC Bioinform., 16 (S18): S6 (December 2015)A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor.. IACR Cryptology ePrint Archive, (2013)Software implementation of an Attribute-Based Encryption scheme., , , , , and . IACR Cryptology ePrint Archive, (2014)Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly., , , , , and . AsiaCCS, page 685-697. ACM, (2018)A Fast Implementation of etaT Pairing in Characteristic Three on Intel Core 2 Duo Processor.. IACR Cryptology ePrint Archive, (2009)Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves., , , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 413-432. Springer, (2009)Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts., , , and . IACR Cryptology ePrint Archive, (2019)The Vector Decomposition Problem., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (1): 188-193 (2010)