Author of the publication

Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences.

, , , and . Appl. Math. Comput., 171 (2): 900-911 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A research on new public-key encryption schemes., , and . Appl. Math. Comput., 169 (1): 51-61 (2005)An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2019)Identity-and-data privacy forward security public auditing protocol in the standard model., and . Int. J. Commun. Syst., (2019)A hybrid news recommendation algorithm based on user's browsing path., and . ICIS, page 1-4. IEEE Computer Society, (2016)An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability., , , , , and . IMIS, page 81-88. IEEE Computer Society, (2012)Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences., , , and . Appl. Math. Comput., 171 (2): 900-911 (2005)Non-interactive Deniable Authentication Protocols., , and . Inscrypt, volume 7537 of Lecture Notes in Computer Science, page 142-159. Springer, (2011)An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings., , , and . INCoS, page 318-322. IEEE, (2012)A non-delegatable strong designated verifier signature in ID-based setting for mobile environment., , , , , and . Math. Comput. Model., 58 (5-6): 1289-1300 (2013)Short Group Signatures Without Random Oracles., , , , , and . J. Comput. Sci. Technol., 22 (6): 805-821 (2007)