Author of the publication

Analysis of bilinear pairing-based accumulator for identity escrowing.

, , , , and . IET Inf. Secur., 2 (4): 99-107 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Cycle Structure of LFSR with Arbitrary Characteristic Polynomial over Finite Fields., , , and . CoRR, (2016)Cryptanalysis of LASH., , , , , , and . IACR Cryptology ePrint Archive, (2007)Non-Malleable Codes with Leakage and Applications to Secure Communication., , , and . CoRR, (2017)Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. A Case Study on ROLLO., , , , and . IEEE Trans. Computers, 72 (7): 2094-2110 (July 2023)Distributing the Encryption and Decryption of a Block Cipher., , , and . Des. Codes Cryptogr., 36 (3): 263-287 (2005)Provably Secure Group Signature Schemes From Code-Based Assumptions., , , , and . IEEE Trans. Inf. Theory, 66 (9): 5754-5773 (2020)Privacy Enhancements for Hardware-Based Security Modules., , and . ICETE (Selected Papers), volume 130 of Communications in Computer and Information Science, page 224-236. Springer, (2009)256 Bit Standardized Crypto for 650 GE - GOST Revisited., , and . CHES, volume 6225 of Lecture Notes in Computer Science, page 219-233. Springer, (2010)Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification., , , , , and . IEEE Trans. Cloud Comput., 11 (3): 2631-2645 (July 2023)Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes., , , , and . IMACC, volume 5921 of Lecture Notes in Computer Science, page 263-277. Springer, (2009)