Author of the publication

Three-party Password-authenticated Key Exchange without Random Oracles.

, , and . SECRYPT, page 15-24. SciTePress, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority., , , and . IACR Cryptology ePrint Archive, (2006)Some Efficient Algorithms for the Final Exponentiation of ηT Pairing., , and . IACR Cryptology ePrint Archive, (2006)An Efficient Channel Estimation Scheme Using Walsh Pilots in Bi-directional Wireless OFDM Relay Systems with Analog Network Coding., and . IEICE Trans. Commun., 96-B (8): 2119-2130 (2013)Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions., , , , and . J. Inf. Process., 24 (2): 275-291 (2016)Chaos-cryptography based privacy preservation technique for video surveillance., , , , and . Multim. Syst., 18 (2): 145-155 (2012)A trellis-coded chaotic modulation scheme., and . ICC, page 5010-5015. IEEE, (2006)On the Security of the RSA-Based Multisignature Scheme for Various Group Structures., , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 352-367. Springer, (2000)High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves., , , , , and . Pairing, volume 6487 of Lecture Notes in Computer Science, page 21-39. Springer, (2010)How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem., , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 322-333. Springer, (1996)Arithmetic Operators for Pairing-Based Cryptography., , , and . CHES, volume 4727 of Lecture Notes in Computer Science, page 239-255. Springer, (2007)