From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fault attacks on hyperelliptic curve discrete logarithm problem over binary field., , и . Sci. China Inf. Sci., 57 (3): 1-17 (2014)Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers., , , и . Sci. China Inf. Sci., (2020)Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy., , , , , , и . IACR Cryptol. ePrint Arch., (2019)P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection., , , , , , , , и . IEEE Trans. Inf. Forensics Secur., (2024)A Secure Public Key Encryption from Computational Linear Diffe-Hellman Problem., , и . CIS, стр. 464-468. IEEE Computer Society, (2012)Efficient Online-friendly Two-Party ECDSA Signature., , , , и . CCS, стр. 558-573. ACM, (2021)Neural Machine Translation with Bilingual History Involved Attention., , , , и . NLPCC (2), том 11839 из Lecture Notes in Computer Science, стр. 265-275. Springer, (2019)IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper)., , и . IWSEC, том 10418 из Lecture Notes in Computer Science, стр. 231-241. Springer, (2017)Lattice-Based Dual Receiver Encryption and More., , , , , и . ACISP, том 10946 из Lecture Notes in Computer Science, стр. 520-538. Springer, (2018)Lossy Projective Hashing and Its Applications., , , и . INDOCRYPT, том 9462 из Lecture Notes in Computer Science, стр. 64-84. Springer, (2015)