From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Applications of Multilinear Forms to Cryptography, и . Contemporary Mathematics, (2003)SANE: a protection architecture for enterprise networks, , , , , , и . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, (2006)Stronger Password Authentication Using Browser Extensions., , , , и . USENIX Security Symposium, USENIX Association, (2005)Key Homomorphic PRFs and Their Applications., , , и . IACR Cryptology ePrint Archive, (2015)Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks., , и . ASIACRYPT (1), том 10031 из Lecture Notes in Computer Science, стр. 220-248. (2016)Constrained Pseudorandom Functions and Their Applications., и . ASIACRYPT (2), том 8270 из Lecture Notes in Computer Science, стр. 280-300. Springer, (2013)The Design and Implementation of Protocol-Based Hidden Key Recovery., , , и . ISC, том 2851 из Lecture Notes in Computer Science, стр. 165-179. Springer, (2003)Low Overhead Broadcast Encryption from Multilinear Maps., , и . CRYPTO (1), том 8616 из Lecture Notes in Computer Science, стр. 206-223. Springer, (2014)Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE., , и . CRYPTO, том 6223 из Lecture Notes in Computer Science, стр. 98-115. Springer, (2010)Simplified OAEP for the RSA and Rabin Functions.. CRYPTO, том 2139 из Lecture Notes in Computer Science, стр. 275-291. Springer, (2001)