From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Software Implementation of Arithmetic in F3m., , и . WAIFI, том 4547 из Lecture Notes in Computer Science, стр. 85-102. Springer, (2007)On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings., , и . WAIFI, том 6087 из Lecture Notes in Computer Science, стр. 114-134. Springer, (2010)Another Look at Provable Security.. EUROCRYPT, том 7237 из Lecture Notes in Computer Science, стр. 8. Springer, (2012)Field Inversion and Point Halving Revisited., , , и . IEEE Trans. Computers, 53 (8): 1047-1059 (2004)On cryptographic protocols employing asymmetric pairings - The role of Ψ revisited., и . Discret. Appl. Math., 159 (13): 1311-1322 (2011)Another look at HMQV.. J. Math. Cryptol., 1 (1): 47-64 (2007)Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields., , , , , , и . IACR Cryptol. ePrint Arch., (2016)Another Look at "Provable Security". II., и . INDOCRYPT, том 4329 из Lecture Notes in Computer Science, стр. 148-175. Springer, (2006)Elliptic Curve., и . Encyclopedia of Cryptography and Security, Springer, (2005)Elliptic Curve Keys., и . Encyclopedia of Cryptography and Security, Springer, (2005)