From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Analysis of the Vector Decomposition Problem., и . Public Key Cryptography, том 4939 из Lecture Notes in Computer Science, стр. 308-327. Springer, (2008)Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval., и . Public Key Cryptography, том 6056 из Lecture Notes in Computer Science, стр. 368-383. Springer, (2010)Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations., , и . IACR Cryptology ePrint Archive, (2016)Ordinary abelian varieties having small embedding degree., , и . IACR Cryptology ePrint Archive, (2004)Elliptic curve Paillier schemes.. IACR Cryptology ePrint Archive, (2001)Computing Pairings Using x-Coordinates Only., и . IACR Cryptology ePrint Archive, (2008)The Weil pairing on elliptic curves over C.. IACR Cryptology ePrint Archive, (2005)Indistinguishable Predicates: A New Tool for Obfuscation., , и . IACR Cryptology ePrint Archive, (2017)Aspects of Pairing Inversion., , и . IACR Cryptology ePrint Archive, (2007)Quantum Equivalence of the DLP and CDHP for Group Actions., , , и . CoRR, (2018)