K. Preetha Mathew
From MaRDI portal
Person:2894352
List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
| Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
| An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model Information Security and Privacy | 2012-09-07 | Paper |
| A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions Information Security Practice and Experience | 2012-06-29 | Paper |
Research outcomes over time
This page was built for person: K. Preetha Mathew