Author of the publication

GEM: A Generic Chosen-Ciphertext Secure Encryption Method.

, , , , , and . CT-RSA, volume 2271 of Lecture Notes in Computer Science, page 263-276. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universally Convertible Directed Signatures., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 682-701. Springer, (2005)A Trapdoor Permutation Equivalent to Factoring.. Public Key Cryptography, volume 1560 of Lecture Notes in Computer Science, page 219-222. Springer, (1999)On Second-Order Differential Power Analysis., , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 293-308. Springer, (2005)Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 1-20. Springer, (2005)GEM: A Generic Chosen-Ciphertext Secure Encryption Method., , , , , and . CT-RSA, volume 2271 of Lecture Notes in Computer Science, page 263-276. Springer, (2002)GCD-Free Algorithms for Computing Modular Inverses., and . CHES, volume 2779 of Lecture Notes in Computer Science, page 243-253. Springer, (2003)Probing Attacks on Tamper-Resistant Devices., , and . CHES, volume 1717 of Lecture Notes in Computer Science, page 303-315. Springer, (1999)How to Disembed a Program?, , , and . CHES, volume 3156 of Lecture Notes in Computer Science, page 441-454. Springer, (2004)SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications., , , and . Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, page 107-122. Springer, (2010)Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor.. Public Key Cryptography, volume 1560 of Lecture Notes in Computer Science, page 223-234. Springer, (1999)