From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Two-Round Man-in-the-Middle Security from LPN., , и . TCC (A1), том 9562 из Lecture Notes in Computer Science, стр. 225-248. Springer, (2016)Dynamic Proofs of Retrievability via Oblivious RAM., , и . EUROCRYPT, том 7881 из Lecture Notes in Computer Science, стр. 279-295. Springer, (2013)Dynamic Proofs of Retrievability Via Oblivious RAM., , и . J. Cryptol., 30 (1): 22-57 (2017)The Locality of Searchable Symmetric Encryption., и . EUROCRYPT, том 8441 из Lecture Notes in Computer Science, стр. 351-368. Springer, (2014)Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable., , , , , , и . Public Key Cryptography (2), том 13178 из Lecture Notes in Computer Science, стр. 256-285. Springer, (2022)The Twin Diffie-Hellman Problem and Applications., , и . J. Cryptol., 22 (4): 470-504 (2009)A Lower Bound for One-Round Oblivious RAM., , и . TCC (1), том 12550 из Lecture Notes in Computer Science, стр. 457-485. Springer, (2020)What Else is Revealed by Order-Revealing Encryption?, , и . ACM Conference on Computer and Communications Security, стр. 1155-1166. ACM, (2016)Cryptographic Agility and Its Relation to Circular Encryption., , , и . EUROCRYPT, том 6110 из Lecture Notes in Computer Science, стр. 403-422. Springer, (2010)Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks., и . CRYPTO, том 6223 из Lecture Notes in Computer Science, стр. 666-684. Springer, (2010)