Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximated Two Choices in Randomized Load Balancing., and . ISAAC, volume 3341 of Lecture Notes in Computer Science, page 545-557. Springer, (2004)Hard Functions for Low-Degree Polynomials over Prime Fields., , and . MFCS, volume 6907 of Lecture Notes in Computer Science, page 120-131. Springer, (2011)Computational Indistinguishability Between Quantum States and Its Cryptographic Application., , , and . EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, page 268-284. Springer, (2005)General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction., , , and . Comput. J., 60 (5): 711-728 (2017)Generalized Predecessor Existence Problems for Boolean Finite Dynamical Systems., , and . MFCS, volume 83 of LIPIcs, page 8:1-8:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability., , and . IWSEC, volume 7631 of Lecture Notes in Computer Science, page 123-137. Springer, (2012)Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes., , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 195-211. Springer, (2016)On the Power of Quantum Encryption Keys., and . PQCrypto, volume 5299 of Lecture Notes in Computer Science, page 165-180. Springer, (2008)Universal test for quantum one-way permutations., , , and . Theor. Comput. Sci., 345 (2-3): 370-385 (2005)Security of Encryption Schemes in Weakened Random Oracle Models., , , and . Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, page 403-419. Springer, (2010)