A lwe-based secret sharing scheme A Georgescu IJCA Special Issue on Network Security and Cryptography, NSC (3), 27-29, 2011 | 19 | 2011 |
Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model S Canard, A Georgescu, G Kaim, A Roux-Langlois, J Traoré International Conference on Provable Security, 24-44, 2020 | 17 | 2020 |
Anonymous lattice-based broadcast encryption A Georgescu Information and Communication Technology, 353-362, 2013 | 13 | 2013 |
New trends in lattice-based cryptography A Mihata, E Simion Acta Universitatis Apulensis 29, 53-64, 2012 | 4 | 2012 |
Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks Protocol A Georgescu International Joint Conference SOCO’14-CISIS’14-ICEUTE’14, 495-504, 2014 | 3 | 2014 |
An lwe-based key transfer protocol with anonymity A Georgescu Tatra Mountains Mathematical Publications 53 (1), 119-135, 2012 | 2 | 2012 |
Some Results on Algebraic Cryptanalysis of A5/2 Algorithm A Mihaita Journal of Mobile, Embedded and Distributed Systems 2 (1), 1-7, 2010 | 2 | 2010 |
A Generic Transform from Multi-round Interactive Proof to NIZK PA Fouque, A Georgescu, C Qian, A Roux-Langlois, W Wen Public-Key Cryptography–PKC 2023: 26th IACR International Conference on …, 2023 | 1 | 2023 |
A key agreement protocol based on Identity-Based Proxy Re-encryption A Atanasiu, A Mihaita Proceedings of the 2011 International Conference on Security and Management …, 2011 | 1 | 2011 |
Statistical tools used in cryptographic evaluation A Georgescu, RF Olimid, E Simion Bulletin of the Transilvania University of Brasov• Vol 4 (53), 2011 | | 2011 |
Criptografie si Securitatea Informatiei. Aplicatii. DNE Simion, A Georgescu, D Naccache, RF Olimid, AG Oprina, ... | | |