Author of the publication

In search of mathematical primitives for deriving universal projective hash families.

, and . Appl. Algebra Eng. Commun. Comput., 19 (2): 161-173 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-Based Encryption with Master Key-Dependent Message Security and Applications., , and . IACR Cryptology ePrint Archive, (2012)Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption., and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 252-266. Springer, (2006)A Practical Public Key Cryptosystem from Paillier and Rabin Schemes., , , and . Public Key Cryptography, volume 2567 of Lecture Notes in Computer Science, page 279-291. Springer, (2003)The Underlying Graph of a Line Digraph.. Discrete Applied Mathematics, (1992)The Kernel Matrix Diffie-Hellman Assumption., , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 729-758. (2016)A Provably Secure Elliptic Curve Scheme with Fast Encryption., , , and . INDOCRYPT, volume 3348 of Lecture Notes in Computer Science, page 245-259. Springer, (2004)An Unbalanced Protocol for Group Key Exchange., and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 172-180. Springer, (2004)In search of mathematical primitives for deriving universal projective hash families., and . Appl. Algebra Eng. Commun. Comput., 19 (2): 161-173 (2008)Weighted Threshold Secret Sharing Schemes., , , and . Inf. Process. Lett., 70 (5): 211-216 (1999)An Algebraic Framework for Diffie-Hellman Assumptions., , , , and . J. Cryptology, 30 (1): 242-288 (2017)