From post

Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.

, , и . Public Key Cryptography, том 6056 из Lecture Notes in Computer Science, стр. 193-208. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Designated server-aided revocable identity-based keyword search on lattice., , , , и . EURASIP J. Wirel. Commun. Netw., 2021 (1): 174 (2021)Threshold password authentication against guessing attacks in Ad hoc networks., , и . Ad Hoc Networks, 5 (7): 1046-1054 (2007)A secure anonymous routing protocol with authenticated key exchange for ad hoc networks., , , и . Comput. Stand. Interfaces, 29 (5): 521-527 (2007)New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160., , , , , и . IACR Trans. Symmetric Cryptol., 2019 (3): 169-192 (2019)Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol., , , и . IEEE Commun. Lett., 12 (2): 149-151 (2008)LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs., , , , и . IEEE Trans. Inf. Forensics Secur., (2020)Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing., , , , , и . IEEE Trans. Inf. Forensics Secur., 13 (1): 94-105 (2018)Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory., , и . Comput. J., 64 (8): 1264-1276 (2021)Improved RSA lossy trapdoor function and applications., , , и . Int. J. Inf. Comput. Secur., 14 (3/4): 229-241 (2021)Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations., , , , и . TCC (1), том 14369 из Lecture Notes in Computer Science, стр. 238-267. Springer, (2023)