From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage., и . ProvSec, том 6980 из Lecture Notes in Computer Science, стр. 348-365. Springer, (2011)Interactive Zero-Knowledge with Restricted Random Oracles., и . TCC, том 3876 из Lecture Notes in Computer Science, стр. 21-40. Springer, (2006)Computationally-Fair Group and Identity-Based Key-Exchange., и . TAMC, том 7287 из Lecture Notes in Computer Science, стр. 237-247. Springer, (2012)Reduction Zero-Knowledge., , , и . SCN, том 2576 из Lecture Notes in Computer Science, стр. 303-317. Springer, (2002)Resettable Zero-Knowledge in the Weak Public-Key Model., , , и . EUROCRYPT, том 2656 из Lecture Notes in Computer Science, стр. 123-139. Springer, (2003)Secure Dynamic SSE via Access Indistinguishable Storage., и . AsiaCCS, стр. 535-546. ACM, (2016)Identity-Based Identity-Concealed Authenticated Key Exchange., , , и . ESORICS (2), том 12973 из Lecture Notes in Computer Science, стр. 651-675. Springer, (2021)A New Framework for Privacy of RFID Path Authentication., , , и . ACNS, том 7341 из Lecture Notes in Computer Science, стр. 473-488. Springer, (2012)High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature., , , , и . CoRR, (2022)Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain.. AsiaCCS, стр. 529-538. ACM, (2019)