-
1
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01Subjects: “…public key cryptography…”
Get full text
Article -
2
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01Subjects: Get full text
Article -
3
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01Subjects: Get full text
Article -
4
An efficient method to generate elliptic curves
Published 2001-01-01Subjects: “…public key cryptosystem…”
Get full text
Article -
5
Network authentication technology based on public key system
Published 2016-02-01Subjects: Get full text
Article -
6
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01Subjects: Get full text
Article -
7
Public key searchable encryption scheme based on blockchain
Published 2020-04-01Subjects: Get full text
Article -
8
-
9
Application of public key infrastructure in telecom operators
Published 2020-11-01Subjects: “…public key infrastructure…”
Get full text
Article -
10
Cryptanalysis and improvement of several certificateless digital signature schemes
Published 2008-01-01Subjects: Get full text
Article -
11
Blockchain-based high transparent PKI authentication protocol
Published 2022-08-01Subjects: Get full text
Article -
12
-
13
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01Subjects: Get full text
Article -
14
Computationally secure steganography based on speech synthesis
Published 2022-06-01Subjects: Get full text
Article -
15
Security of the cryptosystems based on ergodic matrices
Published 2015-08-01Subjects: Get full text
Article -
16
Novel construction of forward-secure public-key encryption in the standard model
Published 2014-02-01Subjects: “…public-key encryption…”
Get full text
Article -
17
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: Get full text
Article -
18
Improvements on results of representation of elements in cyclotomic subgroup
Published 2007-01-01Subjects: “…public-key cryptosystem…”
Get full text
Article -
19
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01Subjects: “…public-key…”
Get full text
Article -
20
Provably secure and efficient escrowable public key encryption schemes
Published 2014-07-01Subjects: Get full text
Article