Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical analysis of Elias's and Peres's deterministic extractors., , and . CISS, page 1-6. IEEE, (2017)Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment., , , and . Formal to Practical Security, volume 5458 of Lecture Notes in Computer Science, page 116-137. Springer, (2009)Authenticated encryption and steganography in unconditional security setting., and . ICITS, page 1-6. IEEE, (2005)Unconditionally Secure Blind Signatures., , , and . ICITS, volume 4883 of Lecture Notes in Computer Science, page 23-43. Springer, (2007)Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption., and . IMACC, volume 8308 of Lecture Notes in Computer Science, page 324-343. Springer, (2013)Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles., and . Public Key Cryptography (1), volume 9614 of Lecture Notes in Computer Science, page 255-279. Springer, (2016)IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures., , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 105-122. Springer, (2023)An Efficient Dynamic Detection Method for Various x86 Shellcodes., , , and . SAINT, page 284-289. IEEE Computer Society, (2012)Bloomier Filters on 3-Hypergraphs., and . WISA, volume 14402 of Lecture Notes in Computer Science, page 16-26. Springer, (2023)Quantum-Secure Aggregate One-time Signatures with Detecting Functionality., and . AINA (2), volume 450 of Lecture Notes in Networks and Systems, page 573-585. Springer, (2022)