Author of the publication

Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups.

, , , and . ICMS, volume 10931 of Lecture Notes in Computer Science, page 137-146. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation., , , and . CNS, page 531-539. IEEE, (2017)Using Semidirect Product of (Semi)groups in Public Key Cryptography., and . CiE, volume 9709 of Lecture Notes in Computer Science, page 132-141. Springer, (2016)Generic properties of Whitehead's Algorithm, stabilizers in Aut(Fk) and one-relator groups, , and . CoRR, (2003)Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups., , , and . ICMS, volume 10931 of Lecture Notes in Computer Science, page 137-146. Springer, (2018)BASS: Boolean Automorphisms Signature Scheme., , , and . SecITC, volume 14534 of Lecture Notes in Computer Science, page 1-12. Springer, (2023)Authentication from Matrix Conjugation., and . Groups Complexity Cryptology, 1 (2): 199-205 (2009)Zero-knowledge authentication schemes from actions on graphs, groups, or rings, and . CoRR, (2008)Using decision problems in public key cryptography, and . CoRR, (2007)A Practical Attack on a Braid Group Based Cryptographic Protocol., , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 86-96. Springer, (2005)Hashing with Polynomials.. ICISC, volume 4296 of Lecture Notes in Computer Science, page 22-28. Springer, (2006)