From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Abuse-Free Optimistic Contract Signing., , и . CRYPTO, том 1666 из Lecture Notes in Computer Science, стр. 449-466. Springer, (1999)Mis-representation of Identities in E-cash Schemes and how to Prevent it., , , и . ASIACRYPT, том 1163 из Lecture Notes in Computer Science, стр. 276-285. Springer, (1996)Adaptive Security for the Additive-Sharing Based Proactive RSA., , и . Public Key Cryptography, том 1992 из Lecture Notes in Computer Science, стр. 240-263. Springer, (2001)An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack.. Public Key Cryptography, том 2567 из Lecture Notes in Computer Science, стр. 47-61. Springer, (2003)Concurrent Oblivious Transfer., и . FOCS, стр. 314-324. IEEE Computer Society, (2000)Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract)., , и . TCC, том 2951 из Lecture Notes in Computer Science, стр. 171-190. Springer, (2004)Anonymous Investing: Hiding the Identities of Stockholders., и . Financial Cryptography, том 1648 из Lecture Notes in Computer Science, стр. 212-229. Springer, (1999)Adaptively-Secure Optimal-Resilience Proactive RSA., , и . ASIACRYPT, том 1716 из Lecture Notes in Computer Science, стр. 180-194. Springer, (1999)Password-Authenticated Key Exchange Based on RSA., , и . ASIACRYPT, том 1976 из Lecture Notes in Computer Science, стр. 599-613. Springer, (2000)Two-Party Generation of DSA Signatures., и . CRYPTO, том 2139 из Lecture Notes in Computer Science, стр. 137-154. Springer, (2001)