Author of the publication

General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications.

, and . J. Softw., 9 (10): 2557-2563 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding., , , and . Future Gener. Comput. Syst., (2019)On the key dependent message security of DHIES., , , , and . ICAIT, page 322-328. IEEE, (2017)Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (3): 898-905 (2015)Certificateless Dynamic Data Sharing Scheme With File Recommendation and Integrity Auditing Functions in Cloud-Fog Environment., and . IEEE Internet Things J., 11 (6): 9630-9644 (March 2024)A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding., and . J. Commun., 10 (1): 43-47 (2015)General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications., and . J. Softw., 9 (10): 2557-2563 (2014)Identity-based proof of retrievability meets with identity-based network coding., and . Clust. Comput., 25 (5): 3067-3083 (2022)Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions., and . Secur. Commun. Networks, 8 (8): 1525-1536 (2015)KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited., and . SECRYPT, page 299-306. SciTePress, (2014)On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (11): 2267-2271 (2014)