Author of the publication

All-but-One Dual Projective Hashing and Its Applications.

, , , , , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 181-198. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage., and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 348-365. Springer, (2011)Interactive Zero-Knowledge with Restricted Random Oracles., and . TCC, volume 3876 of Lecture Notes in Computer Science, page 21-40. Springer, (2006)Computationally-Fair Group and Identity-Based Key-Exchange., and . TAMC, volume 7287 of Lecture Notes in Computer Science, page 237-247. Springer, (2012)Reduction Zero-Knowledge., , , and . SCN, volume 2576 of Lecture Notes in Computer Science, page 303-317. Springer, (2002)Resettable Zero-Knowledge in the Weak Public-Key Model., , , and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 123-139. Springer, (2003)Secure Dynamic SSE via Access Indistinguishable Storage., and . AsiaCCS, page 535-546. ACM, (2016)Identity-Based Identity-Concealed Authenticated Key Exchange., , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 651-675. Springer, (2021)A New Framework for Privacy of RFID Path Authentication., , , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 473-488. Springer, (2012)High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature., , , , and . CoRR, (2022)Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain.. AsiaCCS, page 529-538. ACM, (2019)