From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT., , , и . Wirel. Pers. Commun., 95 (4): 5057-5080 (2017)Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically., , и . CCS, стр. 1987-2005. ACM, (2020)Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity., , , , и . IACR Cryptol. ePrint Arch., (2024)A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing., , и . IMACC, том 11929 из Lecture Notes in Computer Science, стр. 1-21. Springer, (2019)stoRNA: Stateless Transparent Proofs of Storage-time., , , , и . ESORICS (3), том 14346 из Lecture Notes in Computer Science, стр. 389-410. Springer, (2023)A Subversion-Resistant SNARK., , , и . ASIACRYPT (3), том 10626 из Lecture Notes in Computer Science, стр. 3-33. Springer, (2017)Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs., и . IACR Cryptology ePrint Archive, (2020)Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard., , , и . IST, стр. 111-116. IEEE, (2016)Two-Round Concurrent 2PC from Sub-Exponential LWE., , , , , и . IACR Cryptol. ePrint Arch., (2022)Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable., , , и . IACR Cryptol. ePrint Arch., (2023)