From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lattice-based linearly homomorphic signature scheme over binary field., , и . Sci. China Inf. Sci., 56 (11): 1-9 (2013)Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits., , и . ISPEC, том 6672 из Lecture Notes in Computer Science, стр. 222-232. Springer, (2011)Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018., , , и . NSS, том 13041 из Lecture Notes in Computer Science, стр. 369-382. Springer, (2021)Evolutionary Algorithm Based Immune Intrusion Analysis Engine., , , и . ICNC (7), стр. 138-142. IEEE Computer Society, (2008)A Note on P/poly Validity of GVW15 Predicate Encryption Scheme., , , и . IACR Cryptol. ePrint Arch., (2021)On the Invalidity of LV16/Lin17 Obfuscation Schemes., , , и . IACR Cryptol. ePrint Arch., (2023)ECGSC: Elliptic Curve Based Generalized Signcryption., , , , и . UIC, том 4159 из Lecture Notes in Computer Science, стр. 956-965. Springer, (2006)New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree., , , и . Int. J. Comput. Math., 89 (10): 1319-1331 (2012)ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems., , и . CIS, том 4456 из Lecture Notes in Computer Science, стр. 406-416. Springer, (2006)On the value distributions of Walsh spectrums of quadratic Plateaued functions., , и . Comput. Electr. Eng., 37 (6): 849-857 (2011)