Search for persons
X
?
2024 IEEE International Workshop on Antenna Technology (iWAT) ,
1
A study on parallel-arranged leaky wave antenna with dielec..:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
2
Public Key Encryption with Secure Key Leasing:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
3
Bounded Functional Encryption for Turing Machines: Adaptive..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2021 ,
4
Round-Optimal Blind Signatures in the Plain Model from Clas..:
, In:
?
Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science ,
5
Adaptively Secure Constrained Pseudorandom Functions in the..:
, In:
?
Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science ,
6
Adaptively Secure Inner Product Encryption from LWE:
, In:
?
Advances in Cryptology – EUROCRYPT 2020; Lecture Notes in Computer Science ,
7
Compact NIZKs from Standard Assumptions on Bilinear Maps:
, In:
?
2020 IEEE/SICE International Symposium on System Integration (SII) ,
8
Automated Image Presentation for Backhoe Embankment Constru..:
, In:
?
Public-Key Cryptography – PKC 2019; Lecture Notes in Computer Science ,
9
Adaptively Single-Key Secure Constrained PRFs for $$\mathrm..:
, In:
?
2019 IEEE 8th Global Conference on Consumer Electronics (GCCE) ,
10
Estimation of Cone Index from Water Content and Soil Types ..:
, In:
?
Advances in Cryptology – EUROCRYPT 2019; Lecture Notes in Computer Science ,
11
Designated Verifier/Prover and Preprocessing NIZKs from Dif..:
, In:
?
Advances in Cryptology – CRYPTO 2019; Lecture Notes in Computer Science ,
12
Exploring Constructions of Compact NIZKs from Various Assum..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – CRYPTO 2018 ,
13
Constrained PRFs for $$\mathrm{NC}^1$$ in Traditional Group:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2018 ,
14
Tighter Security Proofs for GPV-IBE in the Quantum Random O..:
, In:
?
Proceedings of the first ACM workshop on Asia public-key cryptography ,
15