From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New Security Results on Encrypted Key Exchange., , и . Public Key Cryptography, том 2947 из Lecture Notes in Computer Science, стр. 145-158. Springer, (2004)Distributed Public-Key Cryptography from Weak Secrets., , , и . Public Key Cryptography, том 5443 из Lecture Notes in Computer Science, стр. 139-159. Springer, (2009)Twin signatures: an alternative to the hash-and-sign paradigm., , и . ACM Conference on Computer and Communications Security, стр. 20-27. ACM, (2001)Security Analysis of the EDHOC protocol., и . CoRR, (2022)Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness., , , и . AFRICACRYPT, том 5580 из Lecture Notes in Computer Science, стр. 254-271. Springer, (2009)New Anonymity Notions for Identity-Based Encryption., и . Formal to Practical Security, том 5458 из Lecture Notes in Computer Science, стр. 138-157. Springer, (2009)How to Disembed a Program?, , , и . CHES, том 3156 из Lecture Notes in Computer Science, стр. 441-454. Springer, (2004)Flaws in Applying Proof Methodologies to Signature Schemes., , , и . CRYPTO, том 2442 из Lecture Notes in Computer Science, стр. 93-110. Springer, (2002)Analysis and Improvements of NTRU Encryption Paddings., и . CRYPTO, том 2442 из Lecture Notes in Computer Science, стр. 210-225. Springer, (2002)IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange., , и . CRYPTO, том 3152 из Lecture Notes in Computer Science, стр. 477-493. Springer, (2004)