Author of the publication

Enhanced STS using Check Equation -Extended Version of the Signature scheme proposed in the PQCrypt2010-.

, and . IACR Cryptology ePrint Archive, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC., and . ICC, page 563-567. IEEE, (1986)Multi-Language Zero Knowledge Interactive Proof Systems., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 339-352. Springer, (1990)General Public Key Residue Cryptosystems and Mental Poker Protocols., , , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 374-388. Springer, (1990)Simplification of stochastic fastest NLMS algorithm., , and . ISCAS (3), page 158-161. IEEE, (1999)A fast stability test for multidimensional systems., , , and . ISCAS, page 579-582. IEEE, (1993)Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties., , and . SEC, volume 175 of IFIP Conference Proceedings, page 241-250. Kluwer, (2000)Low Exponent Attack Against Elliptic Curve RSA., , and . Inf. Process. Lett., 53 (2): 77-83 (1995)Nonperfect Secret Sharing Schemes and Matroids., , , , and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 126-141. Springer, (1993)Electronic Money and Key Management from Global and Regional Points of View.. ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 173-184. Springer, (1996)Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems., , , and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 259-273. Springer, (2000)