AN M3 PUBLIC-KEY ENCRYPTION SCHEME

被引:0
|
作者
WILLIAMS, HC
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:358 / 368
页数:11
相关论文
共 50 条
  • [21] SYMMETRICAL PUBLIC-KEY ENCRYPTION
    GALIL, Z
    HABER, S
    YUNG, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 128 - 137
  • [22] Human Public-Key Encryption
    Ferradi, Houda
    Geraud, Remi
    Naccache, David
    [J]. PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 494 - 505
  • [23] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84
  • [24] Improvement in public-key encryption and key exchange scheme based on Chebyshev polynomials
    School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
    不详
    不详
    [J]. Tiedao Xuebao, 2006, 5 (95-98):
  • [25] Forward-secure Public-Key Encryption Scheme with Tamper Evidence
    Jiang Han
    Xu QiuLiang
    Hou MengBo
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 656 - 659
  • [26] Multivariate Public-Key Encryption Scheme Based on Error Correcting Codes
    Wang Houzhen
    Shen Changxiang
    Xu Zhengquan
    Zhang Huanguo
    [J]. CHINA COMMUNICATIONS, 2011, 8 (04) : 23 - 31
  • [27] On some variations of Kurosawa-Desmedt public-key encryption scheme
    Phong, Le Trieu
    Ogata, Wakaha
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 226 - 230
  • [28] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137
  • [29] Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt
    Hulsing, Andreas
    Meijers, Matthias
    Strub, Pierre-Yves
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 622 - 653
  • [30] A LATTICE-BASED PUBLIC-KEY ENCRYPTION SCHEME FOR RFID APPLICATIONS
    Lin Hui
    Dong Yahui
    Liu Dongshen
    Liu Zilong
    Hou Dawei
    Tong Hengqin
    [J]. 2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,