Author of the publication

Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems.

, , , , , and . Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, page 201-212. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nonperfect Secret Sharing Schemes and Matroids., , , , and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 126-141. Springer, (1993)Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems., , , and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 259-273. Springer, (2000)Electronic Money and Key Management from Global and Regional Points of View.. ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 173-184. Springer, (1996)Fast Noise Suppression Algorithm with Kalman Filter Theory., , and . ISUC, page 411-415. IEEE Computer Society, (2008)Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties., , and . SEC, volume 175 of IFIP Conference Proceedings, page 241-250. Kluwer, (2000)Low Exponent Attack Against Elliptic Curve RSA., , and . Inf. Process. Lett., 53 (2): 77-83 (1995)A knapsack cryptosystem based on multiple knapsacks., , , and . ISITA, page 428-432. IEEE, (2010)An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC., and . ICC, page 563-567. IEEE, (1986)Multi-Language Zero Knowledge Interactive Proof Systems., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 339-352. Springer, (1990)General Public Key Residue Cryptosystems and Mental Poker Protocols., , , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 374-388. Springer, (1990)