Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Construction of Irreducible Polynomials over Finite Fields.. SODA, page 484-492. ACM/SIAM, (1993)Computing Frobenius Maps and Factoring Polynomials (Extended Abstract), and . STOC, page 97-105. ACM, (1992)Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience., and . IACR Cryptol. ePrint Arch., (2023)Internet Computer Consensus., , , , , and . PODC, page 81-91. ACM, (2022)On the Security of a Practical Identification Scheme.. EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 344-353. Springer, (1996)Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption, and . Cryptology ePrint Archive, (2001)http://eprint.iacr.org/2001/085/.Using Hash Functions as a Hedge against Chosen Ciphertext Attack.. EUROCRYPT, volume 1807 of Lecture Notes in Computer Science, page 275-288. Springer, (2000)Lower Bounds for Discrete Logarithms and Related Problems.. EUROCRYPT, volume 1233 of Lecture Notes in Computer Science, page 256-266. Springer, (1997)A Composition Theorem for Universal One-Way Hash Functions.. IACR Cryptology ePrint Archive, (1999)On Formal Models for Secure Key Exchange.. IACR Cryptology ePrint Archive, (1999)