From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

General Group Authentication Codes and Their Relation to Ünconditionally-Secure Signatures"., , и . Public Key Cryptography, том 2947 из Lecture Notes in Computer Science, стр. 231-247. Springer, (2004)Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies., , и . Public Key Cryptography, том 7778 из Lecture Notes in Computer Science, стр. 423-442. Springer, (2013)Adaptive Security for the Additive-Sharing Based Proactive RSA., , и . Public Key Cryptography, том 1992 из Lecture Notes in Computer Science, стр. 240-263. Springer, (2001)Self-tallying Elections and Perfect Ballot Secrecy., и . Public Key Cryptography, том 2274 из Lecture Notes in Computer Science, стр. 141-158. Springer, (2002)From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?. ACM Conference on Computer and Communications Security, стр. 1-2. ACM, (2015)Breaking and Repairing Asymmetric Public-Key Traitor Tracing., и . Digital Rights Management Workshop, том 2696 из Lecture Notes in Computer Science, стр. 32-50. Springer, (2002)Forward-secure signatures in untrusted update environments: efficient and generic constructions., , и . ACM Conference on Computer and Communications Security, стр. 266-275. ACM, (2007)Secure Computation Protocol: A Technology for Our Time.. ICETE (1), стр. 19. ScitePress, (2020)Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (Extended Abstract)., , и . EUROCRYPT, том 434 из Lecture Notes in Computer Science, стр. 192-195. Springer, (1989)Characterization of Security Notions for Probabilistic Private-Key Encryption., и . J. Cryptol., 19 (1): 67-95 (2006)