Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three., , , , , and . IEEE Trans. Computers, 57 (11): 1454-1468 (2008)Identity-based partially blind signature in the standard model for electronic cash., , and . Mathematical and Computer Modelling, 58 (1-2): 196-203 (2013)Lattice-based signcryption., , , and . Concurrency and Computation: Practice and Experience, 25 (14): 2112-2122 (2013)Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem., , , and . IEICE Transactions, 89-A (1): 115-123 (2006)An id-based non-interactive tripartite key agreement protocol with K-resilience., , , and . Communications and Computer Networks, page 38-42. IASTED/ACTA Press, (2005)Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles., , and . INCoS, page 578-585. IEEE, (2013)Behavior selection and motion modulation in emotionally grounded architecture for QRIO SDR-4XII., , and . IROS, page 2514-2519. IEEE, (2004)A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering., , , , and . ARES, page 112-119. IEEE Computer Society, (2008)Some Efficient Algorithms for the Final Exponentiation of eta T Pairing., , and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 254-268. Springer, (2007)Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography., , and . IWSEC, volume 7631 of Lecture Notes in Computer Science, page 19-36. Springer, (2012)