Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems., , , , , and . J. Syst. Archit., (2022)VOProof: Efficient zkSNARKs from Vector Oracle Compilers., , , , , and . CCS, page 3195-3208. ACM, (2022)Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability., , , , and . AsiaCCS, page 293-303. ACM, (2016)Shaduf: Non-Cycle Payment Channel Rebalancing., , , and . NDSS, The Internet Society, (2022)Shuffle-based Private Set Union: Faster and More Secure., , , , and . USENIX Security Symposium, page 2947-2964. USENIX Association, (2022)Efficient Implementation of Tate Pairing with Montgomery Ladder Method., , and . INCoS, page 398-402. IEEE, (2013)Fully CCA2 secure identity based broadcast encryption without random oracles., and . Inf. Process. Lett., 109 (11): 527-533 (2009)Fault Detection on the Software Implementation of CLEFIA Lightweight Cipher., , , , and . J. Networks, 7 (8): 1288-1294 (2012)A nonprofiled side-channel analysis based on variational lower bound related to mutual information., , , , , and . Sci. China Inf. Sci., (January 2023)Pseudo random oracle of Merkle-Damgård hash functions revisited., , and . Sci. China Inf. Sci., 62 (3): 32112:1-32112:15 (2019)