From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor., и . IACR Cryptology ePrint Archive, (2001)Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes., и . IACR Cryptology ePrint Archive, (2000)Commitment Schemes and Zero-Knowledge Protocols.. Lectures on Data Security, том 1561 из Lecture Notes in Computer Science, стр. 63-86. Springer, (1998)Efficient and Provable Security Amplifications., , и . Security Protocols Workshop, том 1189 из Lecture Notes in Computer Science, стр. 101-109. Springer, (1996)RFID Security: Tradeoffs between Security and Efficiency., и . CT-RSA, том 4964 из Lecture Notes in Computer Science, стр. 318-332. Springer, (2008)Simplified Threshold RSA with Adaptive and Proactive Security., , и . EUROCRYPT, том 4004 из Lecture Notes in Computer Science, стр. 593-611. Springer, (2006)Multiparty Computation from Threshold Homomorphic Encryption., , и . EUROCRYPT, том 2045 из Lecture Notes in Computer Science, стр. 280-299. Springer, (2001)Isolated Proofs of Knowledge and Isolated Zero Knowledge., , и . EUROCRYPT, том 4965 из Lecture Notes in Computer Science, стр. 509-526. Springer, (2008)Essentially Optimal Universally Composable Oblivious Transfer., , и . ICISC, том 5461 из Lecture Notes in Computer Science, стр. 318-335. Springer, (2008)Scalable Secure Multiparty Computation., и . CRYPTO, том 4117 из Lecture Notes in Computer Science, стр. 501-520. Springer, (2006)