Found 15 Documents (Results 1–15)
Complexity analysis of a top down algorithm motivated by power product expansions. (English) Zbl 1481.94102
Key variation technique based on piggybacking strategies under public key environments. (English) Zbl 1481.94097
MSC:
94A60
Identity-based re-encryption scheme with lightweight re-encryption key generation. (English) Zbl 1481.94112
Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme. (English) Zbl 1481.94089
MSC:
94A60
Filter Results by …
all
top 5
Author
- Aivalis, Constantine J. (1)
- Aragona, Riccardo (1)
- Banerjee, Anirban (1)
- Banerjee, Subhasish (1)
- Bej, Saptarshi (1)
- Bhunia, Chandan Tilak (1)
- Chakraborty, Swarnendu Kumar (1)
- Chande, Manoj Kumar (1)
- Das, Moumita (1)
- Dutta, Manash Pratim (1)
- Ghorbani, Modjtaba (1)
- Gingold, Harry (1)
- Goswami, Rajat Subhra (1)
- Huang, Huawei (1)
- Jiang, Guisheng (1)
- Kalayathankal, Sunny Joseph (1)
- Karayannakis, Dimitris (1)
- Larki, Farzaneh Nowroozi (1)
- Lee, Cheng-Chi (1)
- Li, Chun-Ta (1)
- Li, Chunhua (1)
- Liu, Liang (1)
- Liu, Qi (1)
- Morteza Mirafzal, S. (1)
- Promsakon, Chanon (1)
- Quaintance, Jocelyn (1)
- Rimoldi, Anna (1)
- Sala, Massimiliano (1)
- Shree, D. Jaya (1)
- Susanth, C. (1)
- Tang, Hui-Chin (1)
- Wang, Limin (1)
- Xu, Baogen (1)
- Ye, Jun (1)
- Yu, Guidong (1)
- Zeydi Abdian, Ali (1)