The following pages link to (Q4365738):
Displayed 18 items.
- The ring authenticated encryption scheme-how to provide a clue wisely (Q1007859) (← links)
- Comments on the `\(m\) out of \(n\) oblivious transfer' (Q1045921) (← links)
- Provably secure and pairing-based strong designated verifier signature scheme with message recovery (Q1637871) (← links)
- A novel authenticated encryption scheme and its extension (Q1749917) (← links)
- Improvement of Tseng et al.'s authenticated encryption scheme with message linkages (Q1765881) (← links)
- Synchronization of a novel fractional order stretch-twist-fold (STF) flow chaotic system and its application to a new authenticated encryption scheme (AES) (Q2353872) (← links)
- Convertible multi-authenticated encryption scheme (Q2465980) (← links)
- Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm (Q2570708) (← links)
- Practical convertible authenticated encryption schemes using self-certified public keys (Q2571976) (← links)
- An improved signature scheme without using one-way hash functions (Q2573555) (← links)
- Improvement of Laih and Yen’s multisignature scheme (Q3366285) (← links)
- Using Digital Watermarking for Securing Next Generation Media Broadcasts (Q3401707) (← links)
- Enhance confidentiality of threshold signature for MANET (Q3443212) (← links)
- XTR Algorithm: Efficient and Compact Subgroup Trace Representation (Q5050169) (← links)
- Digital Signatures (Q5050199) (← links)
- Efficient ID-Based Digital Signatures with Message Recovery (Q5458495) (← links)
- Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey (Q6101318) (← links)
- Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT (Q6108841) (← links)