Search results
Computer Standards & Interfaces > 2018 > 56 > C > 101-106
Designs, Codes and Cryptography > 2018 > 86 > 10 > 2407-2440
Wuhan University Journal of Natural Sciences > 2017 > 22 > 2 > 165-170
Wuhan University Journal of Natural Sciences > 2017 > 22 > 2 > 171-177
IEEE Access > 2017 > 5 > 7012 - 7030
Designs, Codes and Cryptography > 2017 > 85 > 1 > 39-76
Personal and Ubiquitous Computing > 2016 > 20 > 5 > 833-846
Lecture Notes in Computer Science > Automata, Languages and Programming > Encryption and related Primitives > 791-802
Lecture Notes in Computer Science > Security in Communication Networks > Public Key Cryptosystems > 220-234
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Identity-Based Cryptography > 288-306
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2005 > Signature Schemes > 154-171