Search

Showing total 3 results
3 results

Search Results

1. Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016.

2. Provably secure identity-based identification and signature schemes from code assumptions.

3. A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes.