Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A successive carrier-transmission model for narrow-band subliminal channels., and . ICISC, page 179-187. Korea Institute of Information Security and Cryptology (KIISC), (1998)Efficient Identity-Based Encryption with Tight Security Reduction., , , , , , and . IACR Cryptology ePrint Archive, (2005)A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries., and . IACR Cryptology ePrint Archive, (2006)Comparison Between XL and Gröbner Basis Algorithms., , , , and . ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 338-353. Springer, (2004)On Optimal Partition of a Query Set into Subsets Having the Consecutive Retrieval Property., and . FODO, page 75-97. Academic Press, (1981)Leakage-Resilient Authenticated Key Establishment Protocols., , and . ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, page 155-172. Springer, (2003)On the Key Predistribution System: A Practical Solution to the Key Distribution Problem., and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 185-193. Springer, (1987)Bounds on the Number of Users for Random 2-Secure Codes., , and . AAECC, volume 5527 of Lecture Notes in Computer Science, page 239-242. Springer, (2009)Trends and Challenges for Securer Cryptography in Practice.. Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 1. Springer, (2005)Orthogonality between Key Privacy and Data Privacy, Revisited., , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 313-327. Springer, (2007)