From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Forward-Security in Private-Key Cryptography., и . IACR Cryptology ePrint Archive, (2001)Verifiable Partial Key Escrow., и . IACR Cryptology ePrint Archive, (1996)Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions., и . CRYPTO, том 1666 из Lecture Notes in Computer Science, стр. 252-269. Springer, (1999)Keying Hash Functions for Message Authentication., , и . CRYPTO, том 1109 из Lecture Notes in Computer Science, стр. 1-15. Springer, (1996)Nonces Are Noticed: AEAD Revisited., , и . CRYPTO (1), том 11692 из Lecture Notes in Computer Science, стр. 235-265. Springer, (2019)Hash-Function Based PRFs: AMAC and Its Multi-User Security., , и . EUROCRYPT (1), том 9665 из Lecture Notes in Computer Science, стр. 566-595. Springer, (2016)Chain Reductions for Multi-Signatures., и . IACR Cryptol. ePrint Arch., (2021)Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles., и . Public Key Cryptography, том 4450 из Lecture Notes in Computer Science, стр. 201-216. Springer, (2007)Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation., и . J. Cryptol., 9 (3): 149-166 (1996)Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing., , и . ASIACRYPT, том 7658 из Lecture Notes in Computer Science, стр. 134-153. Springer, (2012)