From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Finite set theory and its application to cryptology. Journal of Statistical Planning and Inference, 51 (2): 129--136 (15.04.1996)Proxy multi-signature binding positioning protocol., , и . ICCC, стр. 166-170. IEEE, (2014)Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications., , и . Concurr. Comput. Pract. Exp., 28 (4): 1145-1160 (2016)Threshold password authentication against guessing attacks in Ad hoc networks., , и . Ad Hoc Networks, 5 (7): 1046-1054 (2007)Improved RSA lossy trapdoor function and applications., , , и . Int. J. Inf. Comput. Secur., 14 (3/4): 229-241 (2021)New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160., , , , , и . IACR Trans. Symmetric Cryptol., 2019 (3): 169-192 (2019)Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol., , , и . IEEE Commun. Lett., 12 (2): 149-151 (2008)Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory., , и . Comput. J., 64 (8): 1264-1276 (2021)Designated server-aided revocable identity-based keyword search on lattice., , , , и . EURASIP J. Wirel. Commun. Netw., 2021 (1): 174 (2021)Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations., , , , и . TCC (1), том 14369 из Lecture Notes in Computer Science, стр. 238-267. Springer, (2023)