Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A successive carrier-transmission model for narrow-band subliminal channels., and . ICISC, page 179-187. Korea Institute of Information Security and Cryptology (KIISC), (1998)Efficient Identity-Based Encryption with Tight Security Reduction., , , , , , and . IACR Cryptology ePrint Archive, (2005)A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries., and . IACR Cryptology ePrint Archive, (2006)A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size., , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 944-952. Springer, (2005)On the Key Predistribution System: A Practical Solution to the Key Distribution Problem., and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 185-193. Springer, (1987)Efficient Asymmetric Self-Enforcement Scheme with Public Traceability., , , and . Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, page 225-239. Springer, (2001)Parallel Key-Insulated Public Key Encryption., , and . Public Key Cryptography, volume 3958 of Lecture Notes in Computer Science, page 105-122. Springer, (2006)On the Key-Privacy Issue of McEliece Public-Key Encryption., , , , and . AAECC, volume 4851 of Lecture Notes in Computer Science, page 168-177. Springer, (2007)Privacy Enhanced RFID Using Quasi-Dyadic Fix Domain Shrinking., , , and . GLOBECOM, page 1-5. IEEE, (2010)A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack., , and . IEICE Trans. Inf. Syst., 96-D (2): 357-364 (2013)