共 50 条
- [41] Function-private functional encryption in the private-key setting Lect. Notes Comput. Sci., (306-324):
- [42] Homomorphic Encryption: From Private-Key to Public-Key THEORY OF CRYPTOGRAPHY, 2011, 6597 : 219 - 234
- [43] Building Key-Private Public-Key Encryption Schemes INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 276 - 292
- [44] Enterprise private cloud file encryption system based on tripartite secret key protocol PROCEEDINGS OF THE 2015 INTERNATIONAL INDUSTRIAL INFORMATICS AND COMPUTER ENGINEERING CONFERENCE, 2015, : 166 - 169
- [46] A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 256 - 264
- [47] Enhanced Chaotic Key-Based Algorithm for Low-Entropy Image Encryption 2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 385 - 388
- [48] PRIVATE-KEY ENCRYPTION BASED ON CONCATENATION OF CODES IEE PROCEEDINGS-COMMUNICATIONS, 1994, 141 (03): : 105 - 110
- [49] On private-key encryption using product codes Computers and Electrical Engineering, 1999, 25 (06): : 439 - 450