Author of the publication

Improving the Security of the McEliece Public-Key Cryptosystem.

. ASIACRYPT, volume 1514 of Lecture Notes in Computer Science, page 200-213. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems., , , and . IEEE Trans. Information Forensics and Security, 3 (3): 488-497 (2008)oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks., , and . IEEE Trans. Information Forensics and Security, 7 (2): 651-663 (2012)A Design and Implementation of Multi-source Wi-Fi Display Model on Android Devices., , and . IIH-MSP, page 207-210. IEEE, (2015)A Pair-wise Key Establishment for Wireless Sensor Networks., , , and . IIH-MSP, page 1152-1155. IEEE Computer Society, (2009)Password-based authentication and key distribution protocols with perfect forward secrecy., and . J. Comput. Syst. Sci., 72 (6): 1002-1011 (2006)A response to a critique of Ä novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011)., , , and . Electronic Commerce Research and Applications, 11 (4): 443-444 (2012)Multi-agent-based cloud utilization for the IT office-aid asset distribution chain: An empirical case study., and . Inf. Sci., (2013)A collaborative routing protocol against routing disruptions in MANETs., , , and . Personal and Ubiquitous Computing, 17 (5): 865-874 (2013)An efficient remote use authentication scheme using smart cards.. IEEE Trans. Consumer Electronics, 46 (4): 958-961 (2000)On-line multiple secret sharing based on a one-way function.. Computer Communications, 22 (8): 745-748 (1999)