The following pages link to (Q4474196):
Displaying 4 items.
- Programmable hash functions and their applications (Q434345) (← links)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (Q488261) (← links)
- A provably secure proxy signcryption scheme using bilinear pairings (Q2336432) (← links)
- Programmable Hash Functions and Their Applications (Q3600211) (← links)