-
1
Provably secure secret sharing scheme based on bilinear maps
Published 2008-01-01Subjects: Get full text
Article -
2
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01Subjects: “…provably secure;certificateless;aggregate signature;resist forgery attack…”
Get full text
Article -
3
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
Published 2024-01-01Subjects: Get full text
Article -
4
Analysis and improvement of a password-based authenticated key exchange protocol
Published 2010-01-01Subjects: Get full text
Article -
5
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01Subjects: Get full text
Article -
6
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01Subjects: “…provably secure…”
Get full text
Article -
7
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01Subjects: “…lattice-based cryptology;provably secure;password authentication;key exchange;ring-learning-with-error…”
Get full text
Article -
8
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01Subjects: Get full text
Article -
9
Provably secure quantum resistance two-server password-authenticated key exchange protocol
Published 2022-03-01Subjects: Get full text
Article -
10
A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses
Published 2023-01-01Subjects: “…Provably secure subset hash functions…”
Get full text
Article -
11
EPN:encryption padding for NTRU with provable security
Published 2008-01-01Subjects: Get full text
Article -
12
A Decentralized Signcryption Scheme Based on CFL
Published 2025-03-01Subjects: Get full text
Article -
13
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01Subjects: Get full text
Article -
14
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01Subjects: “…signcryption;Cocks’ identity cryptosystem;quadratic residue problem;provable security…”
Get full text
Article -
15
Provable data possession scheme with authentication
Published 2016-10-01Subjects: Get full text
Article -
16
-
17
Provable secure digital watermarking scheme
Published 2008-01-01Subjects: “…DRM;watermarking scheme;watermarking protocol attack;provable security;RO mode…”
Get full text
Article -
18
Provably secure and efficient escrowable public key encryption schemes
Published 2014-07-01Subjects: Get full text
Article -
19
Post-quantum verifier-based three-party password authenticated key exchange protocol
Published 2022-04-01Subjects: Get full text
Article -
20
Password-based three-party authenticated key exchange protocol from lattices
Published 2018-11-01Subjects: Get full text
Article