共 50 条
- [41] On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 584 - 613
- [42] On the provable security of an efficient RSA-based Pseudorandom Generator [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 194 - +
- [43] Provable security of ID-based proxy signature schemes [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286
- [44] Provable security signcryption scheme based on RLWE without trapdoor [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (06): : 14 - 25
- [45] An improved algorithm of stream cipher based on LFSR [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
- [46] A Provable Security Scheme of ID-Based Threshold Decryption [J]. FORENSICS IN TELECOMMUNICATIONS, INFORMATION AND MULTIMEDIA, 2009, 8 : 122 - +
- [47] A Short Certificate-based Signature Scheme with Provable Security [J]. INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 243 - 253
- [48] On the Security of Designing a Cellular Automata Based Stream Cipher [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 406 - 413
- [50] Block Cipher Security Evaluation Based on Fuzzy Logic [J]. 2013 FIRST INTERNATIONAL SCIENTIFIC CONFERENCE ON ELECTRICAL, COMMUNICATION, COMPUTER, POWER, AND CONTROL ENGINEERING (ICECCPCE'13), 2013, : 169 - 173