From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Another Look at Security Theorems for 1-Key Nested MACs., и . Open Problems in Mathematics and Computational Science, Springer, (2014)Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent., , и . IACR Cryptology ePrint Archive, (2001)Cryptographic Implications of Hess' Generalized GHS Attack., и . IACR Cryptology ePrint Archive, (2004)Discrete Logarithms, Diffie-Hellman, and Reductions., , и . IACR Cryptology ePrint Archive, (2010)On Cryptographic Protocols Employing Asymmetric Pairings - The Role of Psi Revisited., и . IACR Cryptology ePrint Archive, (2009)The Elliptic Curve Digital Signature Algorithm (ECDSA)., , и . Int. J. Inf. Sec., 1 (1): 36-63 (2001)Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field, , и . STOC, стр. 80-89. ACM, (1991)Koblitz Elliptic Curves., и . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Elliptic Curves., и . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Elliptic Curve Discrete Logarithm Problem., и . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)