From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Further Refinements of Miller Algorithm on Edwards curves. CoRR, (2013)Refinements of Miller's Algorithm over Weierstrass Curves Revisited, и . CoRR, (2011)Ensemble of Hierarchical Temporal Memory for Anomaly Detection., , , и . DSAA, стр. 50-59. IEEE, (2020)Speeding Up Ate Pairing Computation in Affine Coordinates., и . ICISC, том 7839 из Lecture Notes in Computer Science, стр. 262-277. Springer, (2012)A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)., , и . ICISS, том 5352 из Lecture Notes in Computer Science, стр. 116-123. Springer, (2008)User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security., , , , , , и . PST, стр. 1-10. IEEE, (2021)A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions., , и . Cryptogr., 6 (2): 18 (2022)On Double Exponentiation for Securing RSA against Fault Analysis., , и . CT-RSA, том 8366 из Lecture Notes in Computer Science, стр. 152-168. Springer, (2014)Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model., , и . Pairing, том 5671 из Lecture Notes in Computer Science, стр. 35-51. Springer, (2009)Signtiming scheme based on aggregate signature., , и . ISI, стр. 145-149. IEEE, (2008)