Author of the publication

New method of key-dependent message security for asymmetric encryption.

, , , , and . Security and Communication Networks, 8 (13): 2157-2170 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks., , and . Security and Communication Networks, 6 (1): 49-57 (2013)Traceable-then-revocable ciphertext-policy attribute-based encryption scheme., , , and . Future Generation Comp. Syst., (2019)Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network., and . Security and Communication Networks, (2019)Building Secure Public Key Encryption Scheme from Hidden Field Equations., , , and . Security and Communication Networks, (2017)Cryptanalysis of a Knapsack Public Key Cryptosystem., , and . IAS, page 49-52. IEEE Computer Society, (2009)Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption., , , , , and . IEEE Access, (2019)A knapsack-based probabilistic encryption scheme., , and . Inf. Sci., 177 (19): 3981-3994 (2007)Secure Privacy-Preserving Association Rule Mining With Single Cloud Server., , , , , , and . IEEE Access, (2021)Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation., , , , and . J. Ambient Intelligence and Humanized Computing, 10 (2): 429-438 (2019)Lattice-based deniable ring signatures., , , , , and . Int. J. Inf. Sec., 18 (3): 355-370 (2019)