Personensuche
X
?
Post-Quantum Cryptography; Lecture Notes in Computer Science ,
2
Phoenix: Hash-and-Sign with Aborts from Lattice Gadgets:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2023 ,
3
Pattern Matching in Encrypted Stream from Inner Product Enc..:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
4
Lattice Signature with Efficient Protocols, Application to ..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
5
EPID with Efficient Proof of Non-Revocation:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
7
Public Key Encryption with Flexible Pattern Matching:
, In:
?
Public-Key Cryptography – PKC 2021; Lecture Notes in Computer Science ,
8
Improving Revocation for Group Signature with Redactable Si..:
, In:
?
Topics in Cryptology – CT-RSA 2021; Lecture Notes in Computer Science ,
9
EPID with Malicious Revocation:
, In:
?
Topics in Cryptology – CT-RSA 2020; Lecture Notes in Computer Science ,
10
Improved Secure Integer Comparison via Homomorphic Encrypti..:
, In:
?
Provable and Practical Security; Lecture Notes in Computer Science ,
11
Group Signature Without Random Oracles from Randomizable Si..:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2020 ,
12
Efficient Redactable Signature and Application to Anonymous..:
, In:
?
Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science ,
13
Lattice-Based E-Cash, Revisited:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
14
Curves with Fast Computations in the First Pairing Group:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2019 ,
15