Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees., , and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 313-320. Springer, (2013)Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world., , and . Int. J. Serv. Technol. Manag., 23 (1/2): 117-130 (2017)A New Approach to Constructing Digital Signature Schemes (Extended Paper)., , , , and . IACR Cryptology ePrint Archive, (2019)A New Approach to Constructing Digital Signature Schemes - (Short Paper)., , , , and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 363-373. Springer, (2019)A Server-Assisted Hash-Based Signature Scheme., , and . NordSec, volume 10674 of Lecture Notes in Computer Science, page 3-17. Springer, (2017)Verified security of BLT signature scheme., , , and . CPP, page 244-257. ACM, (2020)Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size., and . ACISP, volume 7959 of Lecture Notes in Computer Science, page 235-250. Springer, (2013)A Blockchain-Assisted Hash-Based Signature Scheme., , and . NordSec, volume 11252 of Lecture Notes in Computer Science, page 138-153. Springer, (2018)Efficient Record-Level Keyless Signatures for Audit Logs., , , and . NordSec, volume 8788 of Lecture Notes in Computer Science, page 149-164. Springer, (2014)An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation., , , , , , , , , and 1 other author(s). IEEE Access, (2022)