Author of the publication

The Exact Security of an Identity Based Signature and its Applications.

, and . IACR Cryptology ePrint Archive, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biometrics, Access Control, Smart Cards: A not so simple combination, , and . (2000)Passport Security., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Iterative Modular Division over GF(2m): Novel Algorithm and Implementations on FPGA., and . ARC, volume 3985 of Lecture Notes in Computer Science, page 370-382. Springer, (2006)The adolescence of smart cards.. Future Gener. Comput. Syst., 13 (1): 3-7 (1997)The Exact Security of an Identity Based Signature and its Applications., and . IACR Cryptology ePrint Archive, (2004)Identity Based Undeniable Signatures., and . IACR Cryptology ePrint Archive, (2003)On Rabin-Type Signatures., and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 99-113. Springer, (2001)A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge., and . CRYPTO, volume 403 of Lecture Notes in Computer Science, page 216-231. Springer, (1988)Forward-secure signatures in untrusted update environments: efficient and generic constructions., , and . ACM Conference on Computer and Communications Security, page 266-275. ACM, (2007)Improved Higher-Order Side-Channel Attacks with FPGA Experiments., , , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 309-323. Springer, (2005)