Pages that link to "Item:Q5385725"
From MaRDI portal
The following pages link to Efficient Identity-Based Encryption Without Random Oracles (Q5385725):
Displaying 6 items.
- Programmable hash functions and their applications (Q434345) (← links)
- Attacks on one designated verifier proxy signature scheme (Q1760716) (← links)
- Bonsai trees, or how to delegate a lattice basis (Q1928766) (← links)
- Efficient hybrid encryption from ID-based encryption (Q2267789) (← links)
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting (Q3457062) (← links)
- Programmable Hash Functions and Their Applications (Q3600211) (← links)