Author of the publication

A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.

, , , , , , , , , , , and . ACM Comput. Surv., 55 (12): 251:1-251:32 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions., , , , , , , , , and 2 other author(s). ACM Comput. Surv., 55 (12): 251:1-251:32 (December 2023)Geometric Range Search on Encrypted Data With Forward/Backward Security., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 698-716 (2022)Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain., , , , , , , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 25-45. Springer, (2022)Generic Multi-keyword Ranked Search on Encrypted Cloud Data., , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 322-343. Springer, (2019)PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase., , , , and . INFOCOM Workshops, page 1-6. IEEE, (2022)A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions., , , , , , , , , and 2 other author(s). IACR Cryptol. ePrint Arch., (2022)Range search on encrypted spatial data with dynamic updates., , , , , , , and . J. Comput. Secur., 30 (6): 829-849 (2022)A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data., , , , , and . ISC, volume 13118 of Lecture Notes in Computer Science, page 70-94. Springer, (2021)Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks., , , and . ProvSec, volume 11821 of Lecture Notes in Computer Science, page 303-318. Springer, (2019)A Multi-Client Searchable Encryption Scheme for IoT Environment., , , , , , and . CoRR, (2023)