From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Controlled Homomorphic Encryption: Definition and Construction., , , и . Financial Cryptography Workshops, том 10323 из Lecture Notes in Computer Science, стр. 107-129. Springer, (2017)On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware., , и . IACR Cryptology ePrint Archive, (2010)Impossibility and Feasibility Results for Zero Knowledge with Public Keys., , и . CRYPTO, том 3621 из Lecture Notes in Computer Science, стр. 135-151. Springer, (2005)Publicly Verifiable Proofs from Blockchains., , и . Public Key Cryptography (1), том 11442 из Lecture Notes in Computer Science, стр. 374-401. Springer, (2019)TEnK-U: Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems., , и . IACR Cryptol. ePrint Arch., (2020)The design and implementation of a secure CAPTCHA against man-in-the-middle attacks., , и . Secur. Commun. Networks, 7 (8): 1199-1209 (2014)On Round-Optimal Zero Knowledge in the Bare Public-Key Model., и . EUROCRYPT, том 7237 из Lecture Notes in Computer Science, стр. 153-171. Springer, (2012)Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems., , и . ACNS (1), том 12726 из Lecture Notes in Computer Science, стр. 220-247. Springer, (2021)Black-Box Constructions of Bounded-Concurrent Secure Computation., , , и . SCN, том 12238 из Lecture Notes in Computer Science, стр. 87-107. Springer, (2020)Improved OR-Composition of Sigma-Protocols., , , , и . TCC (A2), том 9563 из Lecture Notes in Computer Science, стр. 112-141. Springer, (2016)