-
1
Provably secure secret sharing scheme based on bilinear maps
Published 2008-01-01Subjects: Get full text
Article -
2
Analysis and improvement of a password-based authenticated key exchange protocol
Published 2010-01-01Subjects: Get full text
Article -
3
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01Subjects: Get full text
Article -
4
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01Subjects: “…provably secure…”
Get full text
Article -
5
Research on password-authenticated key exchange protocol over lattices
Published 2022-12-01Subjects: Get full text
Article -
6
New security model for cross-realm C2C-PAKE protocol
Published 2008-01-01Subjects: Get full text
Article -
7
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01Subjects: Get full text
Article -
8
Provably secure quantum resistance two-server password-authenticated key exchange protocol
Published 2022-03-01Subjects: Get full text
Article -
9
EPN:encryption padding for NTRU with provable security
Published 2008-01-01Subjects: Get full text
Article -
10
Provably secure social network privacy-preserving scheme
Published 2016-08-01Subjects: “…provable secure…”
Get full text
Article -
11
Provably secure private key protection scheme for smart mobile terminal
Published 2012-12-01Subjects: Get full text
Article -
12
Forward-secure ciphertext-policy attribute-based encryption scheme
Published 2014-07-01Subjects: Get full text
Article -
13
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01Subjects: Get full text
Article -
14
Provable data possession scheme with authentication
Published 2016-10-01Subjects: Get full text
Article -
15
-
16
Provably secure rational delegation computation protocol
Published 2019-07-01Subjects: Get full text
Article -
17
Provably secure and efficient escrowable public key encryption schemes
Published 2014-07-01Subjects: Get full text
Article -
18
Post-quantum verifier-based three-party password authenticated key exchange protocol
Published 2022-04-01Subjects: Get full text
Article -
19
Password-based three-party authenticated key exchange protocol from lattices
Published 2018-11-01Subjects: Get full text
Article -
20
Edwards curves based security authentication protocol for mobile RFID systems
Published 2014-11-01Subjects: Get full text
Article