From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Symmetric-Key Broadcast Encryption: The Multi-sender Case., , и . CSCML, том 10332 из Lecture Notes in Computer Science, стр. 200-214. Springer, (2017)Synchronous Consensus with Optimal Asynchronous Fallback Guarantees., , и . TCC (1), том 11891 из Lecture Notes in Computer Science, стр. 131-150. Springer, (2019)Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise.. IMACC, том 4887 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2007)Characterization of Security Notions for Probabilistic Private-Key Encryption., и . J. Cryptol., 19 (1): 67-95 (2006)Secure text processing with applications to private DNA matching., и . ACM Conference on Computer and Communications Security, стр. 485-492. ACM, (2010)Efficiency improvements for signature schemes with tight security reductions., и . ACM Conference on Computer and Communications Security, стр. 155-164. ACM, (2003)A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation., , , и . SCN, том 9841 из Lecture Notes in Computer Science, стр. 587-603. Springer, (2016)Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers., , , и . SP, стр. 825-841. IEEE, (2020)Automating Efficient RAM-Model Secure Computation., , , , и . IEEE Symposium on Security and Privacy, стр. 623-638. IEEE Computer Society, (2014)Toward Secure Key Distribution in Truly Ad-Hoc Networks., , и . SAINT Workshops, стр. 342-346. IEEE Computer Society, (2003)