Author of the publication

New designing of cryptosystems based on quadratic fields.

, , and . Sci. China Ser. F Inf. Sci., 51 (8): 1106-1116 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized Goldwasser and Micali's Type Cryptosystem., , and . J. Comput. Sci. Technol., 37 (2): 459-467 (2022)LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search., , , and . Inf. Sci., (November 2023)Identity-Based Encryption from e-th Power Residue Symbols., , , , and . IACR Cryptology ePrint Archive, (2019)Fault-aware flow control and multi-path routing in VANETs., , , , and . Peer-to-Peer Netw. Appl., 8 (6): 1090-1107 (2015)All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application., , , , and . Comput. J., 62 (8): 1148-1157 (2019)Secure and Efficient Attribute-Based Encryption with Keyword Search., , , and . Comput. J., 61 (8): 1133-1142 (2018)White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively., , , and . IEEE Trans. Dependable Secur. Comput., 15 (5): 883-897 (2018)A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 1941-1958 (May 2023)Fuzzy identity based signature with applications to biometric authentication., , and . Comput. Electr. Eng., 37 (4): 532-540 (2011)Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid., , , , and . IEEE Syst. J., 8 (2): 598-607 (2014)