Author of the publication

Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.

, , , and . AAECC, volume 5527 of Lecture Notes in Computer Science, page 159-168. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-group Secret Sharing for Secure Cloud Storage Service., , , , and . IMCOM, page 63:1-63:8. ACM, (2016)CMCAP: Ephemeral Sandboxes for Adaptive Access Control., , and . SACMAT, page 207-212. ACM, (2019)Investing Data with Untrusted Parties using HE., , , and . SECRYPT, page 845-853. SCITEPRESS, (2021)Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations., , , and . ISIT, page 1432-1436. IEEE, (2006)Multi-Tier Reputation for Data Cooperatives., , , , and . MARBLE, page 253-273. Springer, (2022)An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency., , , , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 47-58. Springer, (2014)Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions., , , , and . J. Supercomput., 73 (10): 4275-4301 (2017)Generalized Oblivious Transfer Protocols Based on Noisy Channels., and . MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 219-229. Springer, (2001)Verifying OAuth Implementations Through Encrypted Network Analysis., , and . SACMAT, page 227-229. ACM, (2019)Parity Check based redistribution of secret shares., and . ISIT, page 959-963. IEEE, (2015)