Author of the publication

Error-correcting codes and cryptography.

, and . Appl. Algebra Eng. Commun. Comput., 19 (3): 213-228 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange., , and . EuroPKI, volume 3545 of Lecture Notes in Computer Science, page 191-205. Springer, (2005)Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 96-110. Springer, (2003)On Channel Capacity and Modulation of Watermarks in Digital Still Images., and . Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, page 125-139. Springer, (1999)An Efficient Group Signature Scheme from Bilinear Maps., and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 455-467. Springer, (2005)Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service., , and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 123-135. Springer, (2006)An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge., , and . ICALP (2), volume 4052 of Lecture Notes in Computer Science, page 46-57. Springer, (2006)Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks., , and . INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, page 155-168. Springer, (2005)Content and Key Management to Trace Traitors in Broadcasting Services., , and . STM, volume 9331 of Lecture Notes in Computer Science, page 236-252. Springer, (2015)Algebraic Cryptanalysis of 58-Round SHA-1., , , and . FSE, volume 4593 of Lecture Notes in Computer Science, page 349-365. Springer, (2007)An Anonymous Loan System Based on Group Signature Scheme., , , and . ISC, volume 2433 of Lecture Notes in Computer Science, page 244-256. Springer, (2002)