From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!, , , и . ASIACRYPT, том 5912 из Lecture Notes in Computer Science, стр. 382-398. Springer, (2009)Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange.. Pairing, том 6487 из Lecture Notes in Computer Science, стр. 147-166. Springer, (2010)Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency., и . ICICS, том 10631 из Lecture Notes in Computer Science, стр. 489-501. Springer, (2017)Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles., и . ACNS, том 7954 из Lecture Notes in Computer Science, стр. 458-474. Springer, (2013)Modeling Agreement Problems in the Universal Composability Framework., , , и . ICICS, том 4861 из Lecture Notes in Computer Science, стр. 350-361. Springer, (2007)Compact public key encryption without full random oracles., и . Pervasive Mob. Comput., (2017)Leaky Random Oracle., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (8): 1795-1807 (2009)Analyzing and Fixing the QACCE Security of QUIC., , , и . SSR, том 10074 из Lecture Notes in Computer Science, стр. 1-31. Springer, (2016)Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model., , , и . IACR Cryptology ePrint Archive, (2009)Multi-cast key distribution: scalable, dynamic and provably secure construction., , , , , и . Int. J. Inf. Sec., 17 (5): 513-532 (2018)