Found: 40
Select item for more details and to access through your institution.
Improved integral cryptanalysis of SPNbox in digital rights management systems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 147, doi. 10.1049/ise2.12087
- By:
- Publication type:
- Article
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 1, p. 41, doi. 10.1049/ise2.12039
- By:
- Publication type:
- Article
Lattice‐based revocable attribute‐based encryption with decryption key exposure resistance.
- Published in:
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 6, p. 428, doi. 10.1049/ise2.12033
- By:
- Publication type:
- Article
Analysis on Aigis‐Enc: Asymmetrical and symmetrical.
- Published in:
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 2, p. 147, doi. 10.1049/ise2.12009
- By:
- Publication type:
- Article
Forward Secure Lattice-Based Sequential Aggregate Signature Schemes in Standard Model.
- Published in:
- Journal of Frontiers of Computer Science & Technology, 2021, v. 15, n. 10, p. 1912, doi. 10.3778/j.issn.1673-9418.2104028
- By:
- Publication type:
- Article
Signature Scheme Using the Root Extraction Problem on Quaternions.
- Published in:
- Journal of Applied Mathematics, 2014, p. 1, doi. 10.1155/2014/819182
- By:
- Publication type:
- Article
Sieve Method for Polynomial Linear Equivalence.
- Published in:
- Journal of Applied Mathematics, 2013, p. 1, doi. 10.1155/2013/872962
- By:
- Publication type:
- Article
Linear spans of optimal sets of frequency hopping sequences.
- Published in:
- RAIRO - Theoretical Informatics & Applications, 2012, v. 46, n. 3, p. 343, doi. 10.1051/ita/2012007
- By:
- Publication type:
- Article
Efficient Certificateless Signature Scheme on NTRU Lattice.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 10, p. 5190, doi. 10.3837/tiis.2016.10.030
- By:
- Publication type:
- Article
Simpler Efficient Group Signature Scheme with Verifier-Local Revocation from Lattices.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 1, p. 414, doi. 10.3837/tiis.2016.01.024
- By:
- Publication type:
- Article
An Efficient Biometric Identity Based Signature Scheme.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 8, p. 2010, doi. 10.3837/tiis.2013.08.015
- By:
- Publication type:
- Article
New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 1343, doi. 10.3837/tiis.2013.05.023
- By:
- Publication type:
- Article
New Constructions of Identity-based Broadcast Encryption without Random Oracles.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 2, p. 428, doi. 10.3837/tiis.2011.02.011
- By:
- Publication type:
- Article
Identity-based Threshold Broadcast Encryption in the Standard Model.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 400, doi. 10.3837/tiis.2010.06.012
- By:
- Publication type:
- Article
An Additively Homomorphic Encryption over Large Message Space.
- Published in:
- International Journal of Information Technology & Web Engineering, 2015, v. 10, n. 3, p. 82, doi. 10.4018/IJITWE.2015070106
- By:
- Publication type:
- Article
LATTICE-BASED STRONG DESIGNATE VERIFIER SIGNATURE AND ITS APPLICATIONS.
- Published in:
- Malaysian Journal of Computer Science, 2012, v. 25, n. 1, p. 11
- By:
- Publication type:
- Article
Bootstrapping of FHE over the Integers with Large Message Space.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6520258
- By:
- Publication type:
- Article
Efficient ring signature schemes over NTRU Lattices.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5252, doi. 10.1002/sec.1694
- By:
- Publication type:
- Article
Revocable and strongly unforgeable identity-based signature scheme in the standard model.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 14, p. 2422, doi. 10.1002/sec.1513
- By:
- Publication type:
- Article
New method of key-dependent message security for asymmetric encryption.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 13, p. 2157, doi. 10.1002/sec.1160
- By:
- Publication type:
- Article
Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1805, doi. 10.1002/sec.881
- By:
- Publication type:
- Article
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 1, p. 69, doi. 10.1002/sec.531
- By:
- Publication type:
- Article
Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 6, p. 614, doi. 10.1002/sec.356
- By:
- Publication type:
- Article
Correlation power analysis of Trivium.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 5, p. 479, doi. 10.1002/sec.329
- By:
- Publication type:
- Article
Hierarchical Identity-Based Encryption with Constant-Size Private Keys.
- Published in:
- ETRI Journal, 2012, v. 34, n. 1, p. 142, doi. 10.4218/etrij.12.0211.0140
- By:
- Publication type:
- Article
Multi-key Fully Homomorphic Encryption from Additive Homomorphism.
- Published in:
- Computer Journal, 2023, v. 66, n. 1, p. 197, doi. 10.1093/comjnl/bxab154
- By:
- Publication type:
- Article
Black-Box Accountable Authority Identity-Based Revocation System.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 525, doi. 10.1093/comjnl/bxz092
- By:
- Publication type:
- Article
Privacy‐preserving convolutional neural network prediction with low latency and lightweight users.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 1, p. 568, doi. 10.1002/int.22640
- By:
- Publication type:
- Article
Improved Identification Protocol in the Quantum Random Oracle Model.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2017, v. 14, n. 3, p. 339
- By:
- Publication type:
- Article
Lattice-based deniable ring signatures.
- Published in:
- International Journal of Information Security, 2019, v. 18, n. 3, p. 355, doi. 10.1007/s10207-018-0417-1
- By:
- Publication type:
- Article
Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/8299232
- By:
- Publication type:
- Article
Lattice-based Threshold Ring Signature with Message Block Sharing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2019, v. 13, n. 2, p. 1003, doi. 10.3837/tiis.2019.02.028
- By:
- Publication type:
- Article
A Key-Policy Attribute-Based Broadcast Encryption.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2013, v. 10, n. 5, p. 444
- By:
- Publication type:
- Article
An Efficient Group Key Agreement Scheme for Mobile Ad-Hoc Networks.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2013, v. 10, n. 1, p. 10
- By:
- Publication type:
- Article
Privacy-preserving association rule mining based on electronic medical system.
- Published in:
- Wireless Networks (10220038), 2022, v. 28, n. 1, p. 303, doi. 10.1007/s11276-021-02846-1
- By:
- Publication type:
- Article
Algebraic Attacks Against Several Weak Variants of GVW'13 ABE.
- Published in:
- International Journal of Foundations of Computer Science, 2019, v. 30, n. 4, p. 607, doi. 10.1142/S012905411940015X
- By:
- Publication type:
- Article
LOWER BOUNDS ON THE SECOND ORDER NONLINEARITY OF BOOLEAN FUNCTIONS.
- Published in:
- International Journal of Foundations of Computer Science, 2011, v. 22, n. 6, p. 1331, doi. 10.1142/S012905411100874X
- By:
- Publication type:
- Article
An Improved Group Signature Scheme with VLR over Lattices.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/9988939
- By:
- Publication type:
- Article
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5553256
- By:
- Publication type:
- Article
Updatable privacy-preserving K-nearest neighbor query in location-based s-ervice.
- Published in:
- Peer-to-Peer Networking & Applications, 2022, v. 15, n. 2, p. 1076, doi. 10.1007/s12083-021-01290-4
- By:
- Publication type:
- Article