Author of the publication

Three-party Password-authenticated Key Exchange without Random Oracles.

, , and . SECRYPT, page 15-24. SciTePress, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards., , , , , , , and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 127-146. Springer, (2015)On the Security of the RSA-Based Multisignature Scheme for Various Group Structures., , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 352-367. Springer, (2000)A trellis-coded chaotic modulation scheme., and . ICC, page 5010-5015. IEEE, (2006)An Efficient Channel Estimation Scheme Using Walsh Pilots in Bi-directional Wireless OFDM Relay Systems with Analog Network Coding., and . IEICE Trans. Commun., 96-B (8): 2119-2130 (2013)Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions., , , , and . J. Inf. Process., 24 (2): 275-291 (2016)Chaos-cryptography based privacy preservation technique for video surveillance., , , , and . Multim. Syst., 18 (2): 145-155 (2012)Particle swarm optimization-based low-complexity three-dimensional UWB localization scheme., , , , and . ICUFN, page 120-124. IEEE, (2014)Transformation-free proxy cryptosystems and their applications to electronic commerce., , , , and . InfoSecu, page 92-98. ACM, (2004)ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps., , , , and . WCC, volume 3969 of Lecture Notes in Computer Science, page 291-303. Springer, (2005)Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack., , , , , , and . SECRYPT, page 39-52. SciTePress, (2015)