From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Searching by Elimination., и . MPC, том 375 из Lecture Notes in Computer Science, стр. 297-306. Springer, (1989)A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic.. CRYPTO, том 1666 из Lecture Notes in Computer Science, стр. 148-164. Springer, (1999)Efficient Binary Conversion for Paillier Encrypted Values., и . EUROCRYPT, том 4004 из Lecture Notes in Computer Science, стр. 522-537. Springer, (2006)Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks., , , и . CT-RSA, том 11405 из Lecture Notes in Computer Science, стр. 453-472. Springer, (2019)Inorder Traversal of a Binary Heap and its Inversion in Optimal Time and Space.. MPC, том 669 из Lecture Notes in Computer Science, стр. 291-301. Springer, (1992)Key extraction from general nondiscrete signals., , , , и . IEEE Trans. Inf. Forensics Secur., 5 (2): 269-279 (2010)Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation., , и . ACNS, том 9696 из Lecture Notes in Computer Science, стр. 346-366. Springer, (2016)Multi-Autority Secret-Ballot Elections with Linear Work., , , и . EUROCRYPT, том 1070 из Lecture Notes in Computer Science, стр. 72-83. Springer, (1996)Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols., , и . CRYPTO, том 839 из Lecture Notes in Computer Science, стр. 174-187. Springer, (1994)Security Aspects of the EcashTM Payment System.. State of the Art in Applied Cryptography, том 1528 из Lecture Notes in Computer Science, стр. 338-352. Springer, (1997)