From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Two-Round Man-in-the-Middle Security from LPN., , и . TCC (A1), том 9562 из Lecture Notes in Computer Science, стр. 225-248. Springer, (2016)Dynamic Proofs of Retrievability via Oblivious RAM., , и . EUROCRYPT, том 7881 из Lecture Notes in Computer Science, стр. 279-295. Springer, (2013)Dynamic Proofs of Retrievability Via Oblivious RAM., , и . J. Cryptol., 30 (1): 22-57 (2017)The Locality of Searchable Symmetric Encryption., и . EUROCRYPT, том 8441 из Lecture Notes in Computer Science, стр. 351-368. Springer, (2014)Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable., , , , , , и . Public Key Cryptography (2), том 13178 из Lecture Notes in Computer Science, стр. 256-285. Springer, (2022)The Twin Diffie-Hellman Problem and Applications., , и . J. Cryptol., 22 (4): 470-504 (2009)A Lower Bound for One-Round Oblivious RAM., , и . TCC (1), том 12550 из Lecture Notes in Computer Science, стр. 457-485. Springer, (2020)What Else is Revealed by Order-Revealing Encryption?, , и . ACM Conference on Computer and Communications Security, стр. 1155-1166. ACM, (2016)Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions., , , и . CRYPTO (1), том 12170 из Lecture Notes in Computer Science, стр. 157-186. Springer, (2020)Digital Signatures from Strong RSA without Prime Generation., , и . Public Key Cryptography, том 9020 из Lecture Notes in Computer Science, стр. 217-235. Springer, (2015)