47 results on '"Lv, Kewei"'
Search Results
2. New Results on the Remote Set Problem and Its Applications in Complexity Study
3. General Constructions of Fuzzy Extractors for Continuous Sources
4. Reducing cobalt leaching in disinfectant degradation: Insights from chitosan-derived carbon encapsulated Co9S8
5. Three-Party Integer Comparison and Applications
6. Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study
7. Using Equivalent Class to Solve Interval Discrete Logarithm Problem
8. Threshold reusable fuzzy extractor and an application to joint access control via biometric information
9. Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study
10. Constant-round auction with insulated bidders
11. Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates
12. The Reductions for the Approximating Covering Radius Problem
13. Using Equivalent Class to Solve Interval Discrete Logarithm Problem
14. Rounding Technique’s Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce
15. The Security of Polynomial Information of Diffie-Hellman Key
16. On Promise Problem of the Generalized Shortest Vector Problem
17. The Security of Individual Bit for XTR
18. The Variant of Remote Set Problem on Lattices
19. Improved Security Proof for Modular Exponentiation Bits
20. Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature
21. Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates
22. The Reductions for the Approximating Covering Radius Problem
23. Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining
24. Generation of Dynamic Authorization Using Cryptography For Private-Keyless Data Sharing
25. Ciphertext-policy attribute-based delay encryption
26. Privacy-Preserving Closest Point Determination Based on Ciphertext Comparison
27. A New Hard-Core Predicate of Paillier’s Trapdoor Function
28. Rounding Technique’s Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce
29. Revised Fischlin’s (Blind) Signature Schemes
30. Reusable Group Fuzzy Extractor and Group-Shared Bitcoin Wallet.
31. The Variant of Remote Set Problem on Lattices
32. The Security of Polynomial Information of Diffie-Hellman Key
33. Improved Security Proof for Modular Exponentiation Bits
34. The Security of Individual Bit for XTR
35. On Promise Problem of the Generalized Shortest Vector Problem
36. Ciphertext-Policy Attribute-Based Delay Encryption
37. Reusable Group Fuzzy Extractor and Group-Shared Bitcoin Wallet
38. Three-Party Integer Comparison and Applications
39. BSA: Enabling Biometric-Based Storage and Authorization on Blockchain
40. Constant-round auction with insulated bidders
41. Computing Interval Discrete Logarithm Problem with Restricted Jump Method
42. A New Hard-Core Predicate of Paillier’s Trapdoor Function
43. Improved algorithm for solving discrete logarithm problem by expanding factor
44. Revised Fischlin’s (Blind) Signature Schemes
45. Fully private auctions for the highest bid
46. Verifiable Signature Sharing Scheme Based on Strong RSA Assumption
47. The hidden number problem of least significant bits
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.