Author of the publication

Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes.

, , and . NaNA, page 278-281. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme., and . INCoS, page 571-576. IEEE, (2012)On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing., and . 3PGCIC, volume 1 of Lecture Notes on Data Engineering and Communications Technologies, page 405-413. Springer, (2016)An Improved Data Integrity Verification Scheme for Cloud Storage., , , , , and . INCoS, volume 182 of Lecture Notes on Data Engineering and Communications Technologies, page 393-401. Springer, (2023)Yet Another Way to Construct Digital Signature in the Standard Model., and . INCoS, page 430-433. IEEE, (2013)Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation., , , , and . J. Ambient Intell. Humaniz. Comput., 10 (2): 429-438 (2019)Differential privacy distributed learning under chaotic quantum particle swarm optimization., , , and . Computing, 103 (3): 449-472 (2021)On the Security of a Cloud Data Storage Auditing Protocol IPAD., , , and . EIDWT, volume 6 of Lecture Notes on Data Engineering and Communications Technologies, page 611-617. Springer, (2017)Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme., and . INCoS, page 581-586. IEEE, (2012)Improved publicly verifiable auditing protocol for cloud storage., , , , , and . Concurr. Comput. Pract. Exp., (2021)Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes., , and . NaNA, page 278-281. IEEE, (2021)