Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compositions of linear functions and applications to hashing., and . Groups Complexity Cryptology, 8 (2): 155-161 (2016)Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups., , , and . ICMS, volume 10931 of Lecture Notes in Computer Science, page 137-146. Springer, (2018)Using Semidirect Product of (Semi)groups in Public Key Cryptography., and . CiE, volume 9709 of Lecture Notes in Computer Science, page 132-141. Springer, (2016)Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation., , , and . CNS, page 531-539. IEEE, (2017)Generic properties of Whitehead's Algorithm, stabilizers in Aut(Fk) and one-relator groups, , and . CoRR, (2003)Authentication from Matrix Conjugation., and . Groups Complexity Cryptology, 1 (2): 199-205 (2009)The Centre of a One-Relator Solvable Group., and . Int. J. Algebra Comput., 3 (1): 51-56 (1993)A note on fully homomorphic encryption of real-life data., and . Int. J. Comput. Math. Comput. Syst. Theory, 6 (4): 381-385 (2021)Tropical cryptography III: digital signatures., , and . IACR Cryptol. ePrint Arch., (2023)MAKE: a Matrix Action Key Exchange., and . IACR Cryptol. ePrint Arch., (2021)