Author of the publication

A Generic Construction for Intrusion-Resilient Public-Key Encryption.

, , , , and . CT-RSA, volume 2964 of Lecture Notes in Computer Science, page 81-98. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Efficiency for Private Stable Matching., , and . IACR Cryptology ePrint Archive, (2006)3DPIN: Enhancing security with 3D display., , and . GCCE, page 129-130. IEEE, (2014)Mutual Search (Extended Abstract)., , , , , and . SODA, page 481-489. ACM/SIAM, (1998)Efficiency Tradeoffs for Malicious Two-Party Computation., and . Public Key Cryptography, volume 3958 of Lecture Notes in Computer Science, page 458-473. Springer, (2006)Efficient generation of shared RSA keys., and . J. ACM, 48 (4): 702-722 (2001)Anonymous Authentication with Subset Queries (extended abstract)., and . ACM Conference on Computer and Communications Security, page 113-119. ACM, (1999)Weakly-Private Secret Sharing Schemes., and . TCC, volume 4392 of Lecture Notes in Computer Science, page 253-272. Springer, (2007)Identity-Based Encryption from the Weil Pairing., and . CRYPTO, volume 2139 of Lecture Notes in Computer Science, page 213-229. Springer, (2001)Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties., and . Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, page 90-102. Springer, (1998)Secure and Efficient Off-Line Digital Money (Extended Abstract)., and . ICALP, volume 700 of Lecture Notes in Computer Science, page 265-276. Springer, (1993)