Publikationen
2021
- (2021). A Key Manipulation Attack on Some Recent Isogeny-Based Key Agreement Protocols. Bulletin Of The Iranian Mathematical Society . http://doi.org/10.1007/s41980-021-00534-6 (Original work published 2021/02/27).
Delegating Supersingular Isogenies over F_p^2 with Cryptographic Applications
(2021). Delegating Supersingular Isogenies over F_p^2 with Cryptographic Applications. Iacr Cryptol. Eprint Arch., 2021, 506. Abgerufen von https://eprint.iacr.org/2021/506.Exportformate
Weiterführende Links
Filter Tags
2020
Construction of arithmetic secret sharing schemes by using torsion limits
(2020). Construction of arithmetic secret sharing schemes by using torsion limits. Hacettepe Journal Of Mathematics And Statistics, 49, 638-647. http://doi.org/10.15672/hujms.460348.Exportformate
Weiterführende Links
Filter Tags
2019
Comments on “verifiable outsourced attribute-based signature scheme”
(2019). Comments on “verifiable outsourced attribute-based signature scheme”. Multimedia Tools And Applications , 78(9), 11735-11742, . http://doi.org/10.1007/s11042-018-6725-7 (Original work published 2019/05/01).Abstract
Exportformate
Weiterführende Links
Filter Tags
Secure delegation of group exponentiations: Efficient and fully verifiable schemes with two servers
(2019). Secure delegation of group exponentiations: Efficient and fully verifiable schemes with two servers. Security And Privacy, n/a, e70. http://doi.org/https://doi.org/10.1002/spy2.70 (Original work published 2019).Abstract
Exportformate
Weiterführende Links
Filter Tags
Secure Delegation of Isogeny Computations and Cryptographic Applications
(2019). Secure Delegation of Isogeny Computations and Cryptographic Applications. In Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop (S. 29–42). New York, NY, USA: Association for Computing Machinery. http://doi.org/10.1145/3338466.3358913.Abstract
Exportformate
Weiterführende Links
Filter Tags
2018
Still wrong use of pairings in cryptography
(2018). Still wrong use of pairings in cryptography. Applied Mathematics And Computation, 333, 467-479. http://doi.org/10.1016/j.amc.2018.03.062 (Original work published sep).Exportformate
Weiterführende Links
Filter Tags
A More Efficient Secure Fully Verifiable Delegation Scheme for Simultaneous Group Exponentiations
(2018). A More Efficient Secure Fully Verifiable Delegation Scheme for Simultaneous Group Exponentiations. In Lecture Notes in Computer Science (S. 74-93). Springer International Publishing. http://doi.org/10.1007/978-3-030-03712-3_7.Exportformate
Weiterführende Links
Filter Tags
Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
(2018). Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT. In Developments in Language Theory (S. 250-267). Springer International Publishing. http://doi.org/10.1007/978-3-319-99136-8_14.Exportformate
Weiterführende Links
Filter Tags
2017
A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps.
(2017). A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps. In Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings (S. 155-164, ). http://doi.org/10.1007/978-3-319-93524-9_10.Exportformate
Weiterführende Links
Filter Tags