Author of the publication

An Efficient Two-Party ECDSA Scheme for Cryptocurrencies.

, , , and . ICISS, volume 14424 of Lecture Notes in Computer Science, page 411-430. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Updates on Sorting of Fully Homomorphic Encrypted Data., , , and . ICCCRI, page 19-24. IEEE Computer Society, (2015)Analysis of Toeplitz MDS Matrices., and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 3-18. Springer, (2017)Parallelization of Faugere's improved F4 algorithm., , , and . HiPC, page 1-8. IEEE Computer Society, (2012)Enterprise Post Quantum Cryptography Migration Tools., , , and . COMSNETS, page 327-329. IEEE, (2024)Bounds on Differential and Linear Branch Number of Permutations., and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 207-224. Springer, (2018)Lightweight Design Choices for LED-like Block Ciphers., , , and . INDOCRYPT, volume 10698 of Lecture Notes in Computer Science, page 267-281. Springer, (2017)An Efficient Two-Party ECDSA Scheme for Cryptocurrencies., , , and . ICISS, volume 14424 of Lecture Notes in Computer Science, page 411-430. Springer, (2023)WiP: Privacy Enabled Biometric Authentication Based on Proof of Decryption Techniques., , , , , and . ICISS, volume 13146 of Lecture Notes in Computer Science, page 185-197. Springer, (2021)Unsupervised Discovery of Corroborative Paths for Fact Validation, , and . The Semantic Web -- ISWC 2019, page 630--646. Cham, Springer International Publishing, (2019)Unsupervised Discovery of Corroborative Paths for Fact Validation., , and . ISWC (1), volume 11778 of Lecture Notes in Computer Science, page 630-646. Springer, (2019)