Author of the publication

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems.

, , , and . IACR Cryptology ePrint Archive, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Secure is Deterministic Encryption?, , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 52-73. Springer, (2015)Insured MPC: Efficient Secure Computation with Financial Penalties., , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 404-420. Springer, (2020)21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State., , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 45-63. Springer, (2018)Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement., , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 500-519. Springer, (2018)A Spendable Cold Wallet from QR Video., , , , and . SECRYPT, page 283-290. SCITEPRESS, (2022)Information-Theoretically Secure String Commitments Based on Packet Reordering Channels., , , and . IEEE Access, (2021)Towards Trusted eHealth Services in the Cloud., and . UCC, page 618-623. IEEE Computer Society, (2015)Digital Signatures from Strong RSA without Prime Generation., , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 217-235. Springer, (2015)On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries., and . CoRR, (2014)On the Commitment Capacity of Unfair Noisy Channels., , and . CoRR, (2019)