Author of the publication

Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption.

, and . EUROCRYPT, volume 330 of Lecture Notes in Computer Science, page 419-453. Springer, (1988)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A successive carrier-transmission model for narrow-band subliminal channels., and . ICISC, page 179-187. Korea Institute of Information Security and Cryptology (KIISC), (1998)Efficient Identity-Based Encryption with Tight Security Reduction., , , , , , and . IACR Cryptology ePrint Archive, (2005)A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries., and . IACR Cryptology ePrint Archive, (2006)Bounds on the Number of Users for Random 2-Secure Codes., , and . AAECC, volume 5527 of Lecture Notes in Computer Science, page 239-242. Springer, (2009)On the Channel Capacity of Narrow-Band Subliminal Channels., and . ICICS, volume 1726 of Lecture Notes in Computer Science, page 309-323. Springer, (1999)Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function., , and . INDOCRYPT, volume 4329 of Lecture Notes in Computer Science, page 303-316. Springer, (2006)Fast Correlation Attack Algorithm with List Decoding and an Application., , and . FSE, volume 2355 of Lecture Notes in Computer Science, page 196-210. Springer, (2001)A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack., , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 196-212. Springer, (2000)A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size., , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 944-952. Springer, (2005)Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)., , and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 196-213. Springer, (2002)