共 50 条
[21]
A Public Key Encryption Based on Third Order Linear Sequences
[J].
2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009),
2009,
:500-504
[22]
Public key encryption with searchable keywords based on Jacobi symbols
[J].
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007,
2007, 4859
:282-296
[23]
Cryptanalysis of the public-key encryption based on braid groups
[J].
ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003,
2003, 2656
:477-490
[26]
HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
[J].
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017,
2018, 10719
:192-212
[27]
A Posteriori Openable Public Key Encryption
[J].
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016,
2016, 471
:17-31
[29]
Ideal Public Key Encryption, Revisited
[J].
PROVABLE AND PRACTICAL SECURITY, PROVSEC 2024, PT I,
2025, 14903
:148-167
[30]
Multipurpose Public-Key Encryption
[J].
ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017,
2017, 10418
:69-84