Search

Your search keyword '"public key encryption"' showing total 1,396 results

Search Constraints

Start Over You searched for: Descriptor "public key encryption" Remove constraint Descriptor: "public key encryption"
1,396 results on '"public key encryption"'

Search Results

1. Analysis of Post-Quantum Cryptographic Algorithms: A Systematic Literature Review

2. k-SUM in the Sparse Regime: Complexity and Applications

5. SMAUG: Pushing Lattice-Based Key Encapsulation Mechanisms to the Limits

6. Secure Data Transmission Scheme in Wireless Sensor Network Resisting Unknown Lethal Threats

7. A conceptually simple and generic construction of plaintext checkable encryption in the standard model.

8. Mayfly optimistic hyperelliptic curve cryptosystem

9. Tightly Secure Public Key Encryption With Equality Test in Setting With Adaptive Corruptions

10. Medical Image Encryption Through Chaotic Asymmetric Cryptosystem

11. A new lightweight public key encryption with equality test for cloud storage.

12. Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage.

13. NTWE: A Natural Combination of NTRU and LWE

15. Public Key Encryption with Hierarchical Authorized Keyword Search

16. About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call

18. Securing Non-Terrestrial FSO Link with Public Key Encryption against Flying Object Attacks.

19. 可撤销的多关键字公钥可搜索加密方案.

20. New Constructions of Equality Test Scheme Without Random Oracles

22. A Flexible and Configurable Combined Public Key Scheme

23. Multi-key Encryption Based on RSA and Block Segmentation

24. Cooperative Agent-Based Location Validation for Vehicular Clouds

25. Post-quantum encryption technology based on BRLWE for internet of things

26. Searchable Encryption of Graph Shape Matching in Cloud Computing.

27. Backward Compatible Identity-Based Encryption.

28. Challenges Of Implementing Quantum Key Distribution

29. Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs

30. Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber.

31. Polar coding for Ring-LWE-based public key encryption.

32. Communication Complexities of Leakage-secure PKE Cryptosystems and Generic Transformations.

33. Tightness Subtleties for Multi-user PKE Notions

34. Simulation-Based Bi-Selective Opening Security for Public Key Encryption

35. Public Key Encryption with Fuzzy Matching

36. Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes

38. Subversion-Resilient Public Key Encryption with Practical Watchdogs

39. Multi-Recipient encryption with keyword search without pairing for cloud storage

40. 基于身份的无对密文等值测试公钥加密方案.

41. Public key encryption with distributed keyword search.

42. Privacy protection in social applications: A ciphertext policy attribute‐based encryption with keyword search.

43. Post-quantum encryption technology based on BRLWE for internet of things.

44. Revocable Certificateless Public Key Encryption with Equality Test.

45. An Improved Code-Based Encryption Scheme with a New Construction of Public Key

46. Witness-Based Searchable Encryption with Aggregative Trapdoor

47. Security of Public Key Encryption Against Resetting Attacks

48. SiGamal: A Supersingular Isogeny-Based PKE and Its Application to a PRF

49. Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks

50. Indifferentiability for Public Key Cryptosystems

Catalog

Books, media, physical & digital resources