Author of the publication

On the Complexity of Computing Discrete Logarithms over Algebraic Tori.

, , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 433-442. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Complexity of Computing Discrete Logarithms over Algebraic Tori., , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 433-442. Springer, (2009)A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and Reliability., , , , , and . CANDAR, page 439-444. IEEE Computer Society, (2017)Password-protected secret-sharing schemes without random oracles., , , , and . ISITA, page 566-570. IEEE, (2014)On the Complexity of Computing Discrete Logarithms over Algebraic Tori., , , and . IEICE Trans. Inf. Syst., 97-D (3): 442-447 (2014)Autoreducibility and Completeness for Partial Multivalued Functions., and . IEICE Trans. Inf. Syst., 100-D (3): 422-427 (2017)Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption., , , , and . ACISP, volume 7959 of Lecture Notes in Computer Science, page 72-87. Springer, (2013)A Construction of Cramer-Shoup Like Encryption Protocols Based on the Anshel-Anshel-Goldfeld Key Exchange Protocol., , , and . CANDAR Workshops, page 410-416. IEEE Computer Society, (2018)A construction of attribute-based aggregate signatures., , , , and . ISITA, page 76-80. IEEE, (2016)