Author of the publication

Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups.

, , , and . ICMS, volume 10931 of Lecture Notes in Computer Science, page 137-146. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server., , , and . CCSW, page 17-28. ACM, (2017)Medical Diagnostics Based on Encrypted Medical Data., , , , , , and . BICT, volume 289 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 98-111. Springer, (2019)Secure and Efficient Delegation of Elliptic-Curve Pairing., , , and . ACNS (1), volume 12146 of Lecture Notes in Computer Science, page 45-66. Springer, (2020)Decision and Search in Non-Abelian Cramer-Shoup Public Key Cryptosystem., and . Groups Complexity Cryptology, 1 (2): 217-225 (2009)Private-Key Fully Homomorphic Encryption for Private Classification., , , , and . ICMS, volume 10931 of Lecture Notes in Computer Science, page 475-481. Springer, (2018)Some applications of arithmetic groups in cryptography., and . Groups Complexity Cryptology, 11 (1): 25-33 (2019)Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups., , , and . CNS, page 1-9. IEEE, (2019)A Closer Look at the Tropical Cryptography., and . CoRR, (2020)A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem., , , and . IACR Cryptol. ePrint Arch., (2022)A Non-Commutative Generalization of ElGamal Key Exchange using Polycyclic Groups., and . GLOBECOM, IEEE, (2006)