Search

Your search keyword '"computational Diffie-Hellman problem"' showing total 28 results

Search Constraints

Start Over You searched for: Descriptor "computational Diffie-Hellman problem" Remove constraint Descriptor: "computational Diffie-Hellman problem"
28 results on '"computational Diffie-Hellman problem"'

Search Results

1. mIBS方案的分析与改进.

2. Fuzzy Identity-Based Signature in Standard Model.

3. A New Provably Secure Identity-Based Multi-proxy Signature Scheme

4. Design and Security Analysis of Certificateless Aggregate Signature Scheme

5. Triple receiver public key encryption cryptosystem

6. Triple receiver public key encryption cryptosystem

7. Efficient certificate‐based aggregate signature scheme for vehicular ad hoc networks.

8. A Security-Mediated Encryption Scheme Based on ElGamal Variant

9. An Efficient Certificateless Blind Signature Scheme in the Random Oracle Model

10. Constructing pairing-free certificateless public key encryption with keyword search.

11. Efficient certificateless multi-receiver anonymous signcryption scheme

12. Forward Secure Certificateless Proxy Signature Scheme

14. Certificateless-based efficient aggregate signature scheme with universal designated verifier

15. The l-th power Diffie-Hellman problem and the l-th root Diffie-Hellman problem.

16. Strongly Secure Certificateless Public Key Encryption Without Pairing

17. Efficient certificateless sequential multi-signature scheme

18. A Security-Mediated Encryption Scheme Based on ElGamal Variant

19. Strong non‐repudiation based on certificateless short signatures.

20. Provably Secure Forward Secure Certificateless Proxy Signature Scheme.

21. The square root Diffie-Hellman problem.

22. Analysis and improvement of a new authenticated group key agreement in a mobile environment.

23. Adaptively Secure Threshold Signature Scheme in the Standard Model.

25. Certificateless proxy multi-signature.

26. An identity-based strongly unforgeable signature without random oracles from bilinear pairings.

27. A Security-Mediated Encryption Scheme Based on ElGamal Variant.

28. Quantum equivalence of the DLP and CDHP for group actions

Catalog

Books, media, physical & digital resources