Found: 4
Select item for more details and to access through your institution.
Converting pairing-based cryptosystems from composite to prime order setting – A comparative analysis.
- Published in:
- Journal of Mathematical Cryptology, 2018, v. 12, n. 3, p. 159, doi. 10.1515/jmc-2017-0042
- By:
- Publication type:
- Article
Secure and efficient wildcard search over encrypted data.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 2, p. 199, doi. 10.1007/s10207-020-00492-w
- By:
- Publication type:
- Article
Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations.
- Published in:
- Advances in Mathematics of Communications, 2020, v. 14, n. 2, p. 177, doi. 10.3934/amc.2020015
- By:
- Publication type:
- Article
PRIVATE SET-INTERSECTION WITH COMMON SET-UP.
- Published in:
- Advances in Mathematics of Communications, 2018, v. 12, n. 1, p. 17, doi. 10.3934/amc.2018002
- By:
- Publication type:
- Article