-
1
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01Subjects: “…public key cryptography…”
Get full text
Article -
2
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01Subjects: Get full text
Article -
3
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01Subjects: Get full text
Article -
4
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01Subjects: Get full text
Article -
5
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01Subjects: Get full text
Article -
6
Security of the cryptosystems based on ergodic matrices
Published 2015-08-01Subjects: Get full text
Article -
7
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: “…identity-based public key cryptography…”
Get full text
Article -
8
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01Subjects: Get full text
Article -
9
Efficient and provably-secure certificateless sequential aggregate signature scheme
Published 2022-05-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
10
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01Subjects: Get full text
Article -
11
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
Published 2021-07-01Subjects: “…identity-based public-key cryptography…”
Get full text
Article -
12
Certificateless strong designated verifier multi-signature
Published 2016-06-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
13
-
14
Certificateless public key cryptography based provable data possession scheme in edge environment
Published 2022-07-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
15
Simple Matrix encryption scheme with variable ciphertext length
Published 2018-04-01Subjects: “…multivariable public key cryptography…”
Get full text
Article -
16
Pairing-free certificateless blockchain-based access authentication method for spatial information network
Published 2024-08-01Subjects: “…certificateless public key cryptography distribution technology…”
Get full text
Article -
17
Improved certificateless sequential multi-signature scheme
Published 2015-10-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
18
Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
Published 2023-03-01Subjects: Get full text
Article -
19
Fault analysis on elliptic curve cryptosystems with sliding window method
Published 2012-01-01Subjects: “…public key cryptography…”
Get full text
Article