Author of the publication

New public key cryptosystems based on non-Abelian factorization problems.

, , , , , and . Security and Communication Networks, 6 (7): 912-922 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

All exceptional groups of lie type have minimal logarithmic signatures., , , and . Appl. Algebra Eng. Commun. Comput., 25 (4): 287-296 (2014)Mesoscopic simulation of chloride ions diffusion in frost-damaged concrete., and . IJMIC, 7 (2): 148-154 (2009)Efficient threshold public key encryption with full security based on dual pairing vector spaces., , , , and . Int. J. Communication Systems, 27 (12): 4059-4077 (2014)Comment on Wu et al.'s Server-aided Verification Signature Schemes., , , and . I. J. Network Security, 10 (2): 158-160 (2010)Simulatability and security of certificateless threshold signatures., , , and . Inf. Sci., 177 (6): 1382-1394 (2007)Hierarchical identity-based broadcast encryption scheme from LWE., , , , and . Journal of Communications and Networks, 16 (3): 258-263 (2014)Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption., , , , and . Comput. J., 56 (10): 1249-1257 (2013)Variance-constrained H∞ state estimation for time-varying multi-rate systems with redundant channels: The finite-horizon case., , , and . Inf. Sci., (2019)BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation., , , and . IEEE Access, (2018)EdgeSense: Edge-Mediated Spatial- Temporal Crowdsensing., , , , , and . IEEE Access, (2019)