From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

White-box Implementation of Stream Cipher., , и . ICISSP, стр. 263-269. SciTePress, (2017)Lattice-based Signcryption with Equality Test in Standard Model., , , , , и . CoRR, (2020)Data Anonymity in Multi-Party Service Model., , и . FGIT-SecTech, том 259 из Communications in Computer and Information Science, стр. 21-30. Springer, (2011)Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices., , , , и . ProvSec, том 13600 из Lecture Notes in Computer Science, стр. 121-136. Springer, (2022)Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem., , , , и . IWSEC, том 12835 из Lecture Notes in Computer Science, стр. 23-41. Springer, (2021)Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme., , , и . ICETE (Selected Papers), том 314 из Communications in Computer and Information Science, стр. 233-248. Springer, (2011)Feasibility study of a camera-based PUF in a realistic scenario., , , , , и . ARES, стр. 31:1-31:6. ACM, (2020)Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes., , , , и . COSADE, том 12244 из Lecture Notes in Computer Science, стр. 43-67. Springer, (2020)A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework., , , и . Security and Management, стр. 323-329. CSREA Press, (2010)Privacy Preservation of User History Graph., , и . WISTP, том 7322 из Lecture Notes in Computer Science, стр. 87-96. Springer, (2012)