Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Paillier Cryptosystem without Trusted Dealer., and . WISA, volume 6513 of Lecture Notes in Computer Science, page 44-60. Springer, (2010)Differential Fault Analysis of Full LBlock., , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 135-150. Springer, (2012)Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol., and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 343-360. Springer, (2007)Securing Provenance of Distributed Processes in an Untrusted Environment., , and . IEICE Trans. Inf. Syst., 95-D (7): 1894-1907 (2012)Regularization with Latent Space Virtual Adversarial Training., , , and . CoRR, (2020)Understanding Likelihood of Normalizing Flow and Image Complexity through the Lens of Out-of-Distribution Detection., , and . AAAI, page 21492-21500. AAAI Press, (2024)One-Time Delegation of Unlinkable Signing Rights and Its Application.. ProvSec, volume 12505 of Lecture Notes in Computer Science, page 103-123. Springer, (2020)Constructions of Fail-Stop Signatures for Multi-signer Setting., , , , and . AsiaJCIS, page 112-123. IEEE Computer Society, (2015)Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs., , and . IMIS, page 660-664. IEEE Computer Society, (2012)Load Balancing for Sharded Blockchains., , and . Financial Cryptography Workshops, volume 12063 of Lecture Notes in Computer Science, page 512-524. Springer, (2020)