Author of the publication

Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds.

, , , , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 355-376. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Analysis of Multi-Party Contract Signing., , and . CSFW, page 266-265. IEEE Computer Society, (2004)A Probabilistic Poly-Time Framework for Protocol Analysis., , , and . ACM Conference on Computer and Communications Security, page 112-121. ACM, (1998)Reduction-Based Formal Analysis of BGP Instances., , , , and . TACAS, volume 7214 of Lecture Notes in Computer Science, page 283-298. Springer, (2012)On Lambek's Restriction in the Presence of Exponential Modalities., , and . LFCS, volume 9537 of Lecture Notes in Computer Science, page 146-158. Springer, (2016)Some Semantic Aspects of Polymorphic Lambda Calculus, and . LICS, page 315-319. IEEE Computer Society, (1987)Decision Problems for Propositional Linear Logic., , , and . Ann. Pure Appl. Logic, 56 (1-3): 239-311 (1992)L-Models and R-Models for Lambek Calculus Enriched with Additives and the Multiplicative Unit., , and . WoLLIC, volume 11541 of Lecture Notes in Computer Science, page 373-391. Springer, (2019)Polynomially Grade Logic I: A Graded Version of System T, , and . LICS, page 375-385. IEEE Computer Society, (1989)A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols., , , , , and . Foundations of Security, Protocols, and Equational Reasoning, volume 11565 of Lecture Notes in Computer Science, page 192-213. Springer, (2019)Some aspects of categorial semantics: sheves and glueing.. Logic Colloquium, page 281-302. Elsevier, (1985)