-
1
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01Subjects: “…public key cryptography…”
Get full text
Article -
2
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01Subjects: Get full text
Article -
3
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01Subjects: Get full text
Article -
4
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01Subjects: Get full text
Article -
5
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01Subjects: Get full text
Article -
6
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01Subjects: Get full text
Article -
7
-
8
Cayley–Purser secured communication and jackknife correlative classification for COVID patient data analysis
Published 2025-02-01Subjects: Get full text
Article -
9
Service for Verification of Electronic Document’s Certificates
Published 2023-12-01Subjects: Get full text
Article