From post

Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain.

, , и . INDOCRYPT, том 13143 из Lecture Notes in Computer Science, стр. 436-461. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards., , , и . ACISP, том 4586 из Lecture Notes in Computer Science, стр. 274-292. Springer, (2007)Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation., , , , , , , и . CoRR, (2021)Oblivious Linear Group Actions and Applications., , , , , , , и . CCS, стр. 630-650. ACM, (2021)Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain., , и . INDOCRYPT, том 13143 из Lecture Notes in Computer Science, стр. 436-461. Springer, (2021)On signatures with tight security in the multi-user setting., и . ISITA, стр. 91-95. IEEE, (2016)A New Combiner for Key Encapsulation Mechanisms., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (12): 1668-1675 (2019)Group signature implies public-key encryption with non-interactive opening., , , и . Int. J. Inf. Sec., 13 (1): 51-62 (2014)On Private Information Retrieval Supporting Range Queries., , , и . ESORICS (2), том 12309 из Lecture Notes in Computer Science, стр. 674-694. Springer, (2020)On-line Non-transferable Signatures Revisited., и . IACR Cryptology ePrint Archive, (2009)Secure Multi-Party Computation Using Polarizing Cards., , , , , , , и . IWSEC, том 9241 из Lecture Notes in Computer Science, стр. 281-297. Springer, (2015)