Author of the publication

The generic construction of continuous leakage-resilient identity-based cryptosystems.

, , and . Theor. Comput. Sci., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage., , , , and . J. Inf. Secur. Appl., (2020)An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing., , , , , , and . IEEE Syst. J., 17 (1): 1012-1023 (March 2023)An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things., , , , , , and . IEEE Syst. J., 17 (1): 72-82 (March 2023)A generic construction of CCA-secure deterministic encryption., , , , , and . Inf. Process. Lett., (2020)Continuous leakage-resilient certificateless public key encryption with CCA security., and . Knowl. Based Syst., (2017)Continual Leakage-Resilient Hedged Public-Key Encryption., , , and . Comput. J., 65 (6): 1574-1585 (2022)Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security., and . Comput. J., 60 (8): 1161-1172 (2017)Novel Public-Key Encryption with Continuous Leakage Amplification., , , , and . Comput. J., 64 (8): 1163-1177 (2021)CCA2 secure public-key encryption scheme tolerating continual leakage attacks., , , and . Secur. Commun. Networks, 9 (17): 4505-4519 (2016)Behavioral Modeling of RF Power amplifiers Using Modified Volterra Series., , and . Journal of Circuits, Systems, and Computers, 18 (2): 351-359 (2009)