Author of the publication

Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups.

, , , and . ICMS, volume 10931 of Lecture Notes in Computer Science, page 137-146. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized Learning Problems and Applications to Non-commutative Cryptography., , , , and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 324-339. Springer, (2011)Extended Abstract.Single-Server Delegation of Ring Multiplications from Quasilinear-time Clients., , , , and . SIN, page 1-8. IEEE, (2021)Secure and Efficient Delegation of Pairings with Online Inputs., , , and . CARDIS, volume 12609 of Lecture Notes in Computer Science, page 84-99. Springer, (2020)Editorial.. Groups Complexity Cryptology, 6 (2): 71 (2014)Thompson's Group and Public Key Cryptography., and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 151-163. (2005)Problems in group theory motivated by cryptography.. CoRR, (2018)On Isomorphism of Lie Algebras with One Defining Relation., , and . Int. J. Algebra Comput., 14 (3): 389-393 (2004)Authentication from Matrix Conjugation., and . Groups Complexity Cryptology, 1 (2): 199-205 (2009)Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups., , , and . ICMS, volume 10931 of Lecture Notes in Computer Science, page 137-146. Springer, (2018)Using Semidirect Product of (Semi)groups in Public Key Cryptography., and . CiE, volume 9709 of Lecture Notes in Computer Science, page 132-141. Springer, (2016)