Author of the publication

Secure Linear Algebra Using Linearly Recurrent Sequences.

, , , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 291-310. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Linear Algebra Using Linearly Recurrent Sequences., , , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 291-310. Springer, (2007)The Design and Implementation of a Secure Auction Service., and . IEEE Trans. Software Eng., 22 (5): 302-312 (1996)Enhancing privacy and trust in electronic communities., , and . EC, page 78-86. ACM, (1999)Secure hypergraphs: privacy from partial broadcast (Extended Abstract)., and . STOC, page 36-44. ACM, (1995)The Blinding of Weak Signatures (Extended Abstract)., and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 67-76. Springer, (1994)Commital Deniable Proofs and Electronic Campaign Finance., and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 373-387. Springer, (2000)Edge Eavesdropping Games., and . SCN, volume 4116 of Lecture Notes in Computer Science, page 1-17. Springer, (2006)Efficient and Secure Evaluation of Multivariate Polynomials and Applications., and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 236-254. (2010)The Omega Key Management Service., , , and . J. Comput. Secur., 4 (4): 267-288 (1996)Cryptology As a Network Service., , , , and . NDSS, The Internet Society, (2001)