From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP., , , , и . CANS, том 8813 из Lecture Notes in Computer Science, стр. 34-49. Springer, (2014)Approximate-Deterministic Public Key Encryption from Hard Learning Problems., , , , и . INDOCRYPT, том 10095 из Lecture Notes in Computer Science, стр. 25-42. (2016)L2-L∞ consensus of stochastic delayed multi-agent systems with ADT switching interaction topologies., , , , , и . Appl. Math. Comput., (2020)Imbalanced Fault Diagnosis of Rolling Bearing Based on Generative Adversarial Network: A Comparative Study., , , и . IEEE Access, (2019)Pipa: Privacy-preserving Password Checkup via Homomorphic Encryption., , и . AsiaCCS, стр. 242-251. ACM, (2021)Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring., , , и . ISPEC, том 7232 из Lecture Notes in Computer Science, стр. 34-45. Springer, (2012)Unreadable Segment Recognition of Single-Lead ECG Signals Based on XGBoost: Fuision of Shannon Energy Envelope and Empirical Mode Decomposition., , , , , , и . MMBD/MLIS, том 341 из Frontiers in Artificial Intelligence and Applications, стр. 688-694. IOS Press, (2021)HLG: A framework for computing graphs in Residue Number System and its application in Fully Homomorphic Encryption., , , , , и . IACR Cryptol. ePrint Arch., (2023)Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy., , , , , , и . IACR Cryptol. ePrint Arch., (2019)IBE with tight security against selective opening and chosen-ciphertext attacks., , и . Des. Codes Cryptogr., 88 (7): 1371-1400 (2020)