From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Post-challenge leakage in public-key encryption., , и . Theor. Comput. Sci., (2015)Concurrent non-malleable statistically hiding commitment., и . Inf. Process. Lett., 112 (11): 443-448 (2012)Chosen-ciphertext attack secure public key encryption with auxiliary inputs., , и . Secur. Commun. Networks, 5 (12): 1404-1411 (2012)An Optimized Inner Product Argument with More Application Scenarios., , , и . ICICS (2), том 12919 из Lecture Notes in Computer Science, стр. 341-357. Springer, (2021)Security Against Subversion in a Multi-surveillant Setting., , и . ACISP, том 11547 из Lecture Notes in Computer Science, стр. 419-437. Springer, (2019)A Combined Micro-block Chain Truncation Attack on Bitcoin-NG., , , , , , и . ACISP, том 11547 из Lecture Notes in Computer Science, стр. 322-339. Springer, (2019)All-but-One Dual Projective Hashing and Its Applications., , , , , и . ACNS, том 8479 из Lecture Notes in Computer Science, стр. 181-198. Springer, (2014)Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing., , , , , , и . USENIX Security Symposium, USENIX Association, (2024)Identity-Based Extractable Hash Proofs and Their Applications., , , и . ACNS, том 7341 из Lecture Notes in Computer Science, стр. 153-170. Springer, (2012)CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System., , , и . Comput. J., 57 (10): 1537-1556 (2014)