Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-based partially blind signature in the standard model for electronic cash., , and . Mathematical and Computer Modelling, 58 (1-2): 196-203 (2013)Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three., , , , , and . IEEE Trans. Computers, 57 (11): 1454-1468 (2008)Lattice-based signcryption., , , and . Concurrency and Computation: Practice and Experience, 25 (14): 2112-2122 (2013)Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem., , , and . IEICE Transactions, 89-A (1): 115-123 (2006)An id-based non-interactive tripartite key agreement protocol with K-resilience., , , and . Communications and Computer Networks, page 38-42. IASTED/ACTA Press, (2005)Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles., , and . INCoS, page 578-585. IEEE, (2013)Behavior selection and motion modulation in emotionally grounded architecture for QRIO SDR-4XII., , and . IROS, page 2514-2519. IEEE, (2004)A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering., , , , and . ARES, page 112-119. IEEE Computer Society, (2008)Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator., , and . IEICE Transactions, 101-A (12): 2162-2170 (2018)CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key., , and . IEICE Transactions, 100-A (12): 2691-2698 (2017)