From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Foundations of Hardware-Based Attested Computation and Application to SGX., , , и . EuroS&P, стр. 245-260. IEEE, (2016)Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation., и . CT-RSA, том 7178 из Lecture Notes in Computer Science, стр. 296-312. Springer, (2012)Strong Knowledge Extractors for Public-Key Encryption Schemes., и . ACISP, том 6168 из Lecture Notes in Computer Science, стр. 164-181. Springer, (2010)Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles., и . ACISP, том 6168 из Lecture Notes in Computer Science, стр. 145-163. Springer, (2010)Provable Security Analysis of FIDO2., , , и . IACR Cryptol. ePrint Arch., (2020)Certificateless signcryption., и . AsiaCCS, стр. 369-372. ACM, (2008)EasyPQC: Verifying Post-Quantum Cryptography., , , , , , , , и . CCS, стр. 2564-2586. ACM, (2021)Execution Time Program Verification with Tight Bounds., , и . PADL, том 13880 из Lecture Notes in Computer Science, стр. 56-72. Springer, (2023)The Last Mile: High-Assurance and High-Speed Cryptographic Implementations., , , , , , , и . SP, стр. 965-982. IEEE, (2020)First Steps Toward a Cryptography-Aware Language and Compiler., , , и . IACR Cryptology ePrint Archive, (2005)