From post

Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting.

, , и . CANS, том 11829 из Lecture Notes in Computer Science, стр. 141-160. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus., , , , , и . AsiaCCS, стр. 907-912. ACM, (2016)Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives., , , , , , и . ACISP, том 13494 из Lecture Notes in Computer Science, стр. 375-398. Springer, (2022)Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation., , , и . ProvSec, том 8782 из Lecture Notes in Computer Science, стр. 162-177. Springer, (2014)Lossy Key Encapsulation Mechanism and Its Applications., , , и . ICISC, том 10157 из Lecture Notes in Computer Science, стр. 126-144. (2016)Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus., , , , , и . IEEE Trans. Serv. Comput., 15 (1): 241-253 (2022)Direct Range Proofs for Paillier Cryptosystem and Their Applications., , , , , и . IACR Cryptol. ePrint Arch., (2024)Fault attacks on hyperelliptic curve discrete logarithm problem over binary field., , и . Sci. China Inf. Sci., 57 (3): 1-17 (2014)Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers., , , и . Sci. China Inf. Sci., (2020)Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy., , , , , , и . IACR Cryptol. ePrint Arch., (2019)P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection., , , , , , , , и . IEEE Trans. Inf. Forensics Secur., (2024)