Author of the publication

Efficient ring signature schemes over NTRU Lattices.

, , , and . Secur. Commun. Networks, 9 (18): 5252-5261 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice-based deniable ring signatures., , , , , and . Int. J. Inf. Sec., 18 (3): 355-370 (2019)Fast S-box security mechanism research based on the polymorphic cipher., , and . Inf. Sci., 178 (6): 1603-1610 (2008)Lattice-based Threshold Ring Signature with Message Block Sharing., , , and . KSII Trans. Internet Inf. Syst., 13 (2): 1003-1019 (2019)Evolutionary Algorithm Based Immune Intrusion Analysis Engine., , , and . ICNC (7), page 138-142. IEEE Computer Society, (2008)Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018., , , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 369-382. Springer, (2021)ECGSC: Elliptic Curve Based Generalized Signcryption., , , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 956-965. Springer, (2006)A Novel Combinatorial Public Key Cryptosystem., and . Informatica, 21 (4): 611-626 (2010)Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits., , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 222-232. Springer, (2011)Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes., and . Int. J. Inf. Commun. Technol., 8 (4): 405-419 (2016)Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions., , , and . Inf. Sci., (2014)