Author of the publication

RSA-Based Certificateless Public Key Encryption.

, , , and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 24-34. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

n-Evasive all-but-many lossy trapdoor function and its constructions., , and . Security and Communication Networks, 8 (4): 550-564 (2015)A New-Style Domain Integrating Management of Windows and UNIX., , and . WAIM, page 619-624. IEEE, (2008)Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010., , , and . INCoS, page 366-372. IEEE, (2013)Applying Binary Patch Comparison to Cisco IOS., , , and . ICNCC, page 38-42. ACM, (2017)Non-malleability Under Selective Opening Attacks: Implication and Separation., , , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 87-104. Springer, (2015)Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings., , , and . Inf. Sci., 180 (24): 5077-5089 (2010)A note on the security of KHL scheme., , , , , and . Theor. Comput. Sci., (2015)Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions., , and . IACR Cryptology ePrint Archive, (2013)Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited., , and . Public Key Cryptography, volume 7778 of Lecture Notes in Computer Science, page 369-385. Springer, (2013)Pseudorandom Functions from LWE: RKA Security and Application., , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 229-250. Springer, (2019)