Author of the publication

On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups.

, , and . CSCML, volume 10332 of Lecture Notes in Computer Science, page 86-95. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)., , , , , , and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 114-127. Springer, (2001)On the Non-repudiation of Isogeny Based Signature Scheme., , and . WISTP, volume 11469 of Lecture Notes in Computer Science, page 63-77. Springer, (2018)A Generalized Takagi-Cryptosystem with a modulus of the form prqs., , , and . INDOCRYPT, volume 1977 of Lecture Notes in Computer Science, page 283-294. Springer, (2000)Prime Numbers of Diffie-Hellman Groups for IKE-MODP., , , and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 228-234. Springer, (2003)A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks., , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 517-526. Springer, (2004)Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement., , , , , and . ITNG, page 747-753. IEEE Computer Society, (2007)Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001., , , and . INDOCRYPT, volume 2247 of Lecture Notes in Computer Science, page 308-315. Springer, (2001)Automation-Considered Logic of Authentication and Key Distribution., and . WISA, volume 2908 of Lecture Notes in Computer Science, page 442-457. Springer, (2003)On Privacy Preserving Data Aggregation Protocols using BGN cryptosystem., , , and . CoRR, (2022)RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis., , , and . IEEE Trans. Computers, 52 (4): 461-472 (2003)