ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Quantum Resistant Public Key Encryption Scheme polarRLCE
Algebra, Codes and Cryptology - Communications in Computer and Information Science
◽
10.1007/978-3-030-36237-9_7
◽
2019
◽
pp. 114-128
◽
Cited By ~ 1
Author(s):
Jingang Liu
◽
Yongge Wang
◽
Zongxinag Yi
◽
Dingyi Pei
Keyword(s):
Public Key
◽
Encryption Scheme
◽
Public Key Encryption
Download Full-text
Related Documents
Cited By
References
Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages
Informatica
◽
10.15388/informatica.2012.374
◽
2012
◽
Vol 23
(4)
◽
pp. 537-562
◽
Cited By ~ 5
Author(s):
Ting-Yi Chang
◽
Min-Shiang Hwang
◽
Wei-Pang Yang
Keyword(s):
Public Key
◽
Encryption Scheme
◽
Public Key Encryption
Download Full-text
Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme
Journal of Software
◽
10.3724/sp.j.1001.2009.03552
◽
2009
◽
Vol 20
(10)
◽
pp. 2907-2914
◽
Cited By ~ 8
Author(s):
Liao-Jun PANG
◽
Hui-Xian LI
◽
Li-Cheng JIAO
◽
Yu-Min WANG
Keyword(s):
Public Key
◽
Encryption Scheme
◽
Public Key Encryption
Download Full-text
Aleakage-resilient certificateless public key encryption scheme with CCA2 security
Frontiers of Information Technology & Electronic Engineering
◽
10.1631/fitee.1601849
◽
2018
◽
Vol 19
(4)
◽
pp. 481-493
◽
Cited By ~ 5
Author(s):
Yan-wei Zhou
◽
Bo Yang
◽
Hao Cheng
◽
Qing-long Wang
Keyword(s):
Public Key
◽
Encryption Scheme
◽
Public Key Encryption
◽
Certificateless Public Key Encryption
Download Full-text
A Key-Ordered Decisional Learning Parity with Noise (DLPN) Scheme for Public Key Encryption Scheme in Cloud Computing
International Journal of Advanced Computer Science and Applications
◽
10.14569/ijacsa.2019.0101121
◽
2019
◽
Vol 10
(11)
◽
Author(s):
Tarasvi Lakum
◽
B.Thirumala Rao
Keyword(s):
Cloud Computing
◽
Public Key
◽
Encryption Scheme
◽
Public Key Encryption
Download Full-text
Searchable Public Key Encryption Scheme with Data Integrity Checking
Advances on Broad-Band Wireless Computing, Communication and Applications - Lecture Notes on Data Engineering and Communications Technologies
◽
10.1007/978-3-319-49106-6_34
◽
2016
◽
pp. 363-370
◽
Cited By ~ 1
Author(s):
Jun Yang
◽
Shujuan Li
Keyword(s):
Data Integrity
◽
Public Key
◽
Encryption Scheme
◽
Public Key Encryption
◽
Integrity Checking
◽
Data Integrity Checking
◽
Searchable Public Key Encryption
Download Full-text
Cryptanalysis of an Additively Homomorphic Public Key Encryption Scheme
Computer Standards & Interfaces
◽
10.1016/j.csi.2022.103623
◽
2022
◽
pp. 103623
Author(s):
Zhiyong Hong
◽
Liguo Zhou
◽
Yu Zhan
◽
Chengdong Liu
◽
Baocang Wang
Keyword(s):
Public Key
◽
Encryption Scheme
◽
Public Key Encryption
Download Full-text
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus
Computational Science and Its Applications – ICCSA 2008 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-69848-7_1
◽
2008
◽
pp. 1-13
◽
Cited By ~ 1
Author(s):
Zhiwei Wang
◽
Xuyun Nie
◽
Shihui Zheng
◽
Yixian Yang
◽
Zhihui Zhang
Keyword(s):
Public Key
◽
Encryption Scheme
◽
Public Key Encryption
◽
New Construction
◽
Multivariate Public Key
Download Full-text
A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations
Selected Areas in Cryptography – SAC 2017 - Lecture Notes in Computer Science
◽
10.1007/978-3-319-72565-9_11
◽
2017
◽
pp. 215-234
◽
Cited By ~ 2
Author(s):
Koichiro Akiyama
◽
Yasuhiro Goto
◽
Shinya Okumura
◽
Tsuyoshi Takagi
◽
Koji Nuida
◽
...
Keyword(s):
Public Key
◽
Encryption Scheme
◽
Public Key Encryption
◽
Non Linear
Download Full-text
Email Encryption System Using Certificateless Public Key Encryption Scheme
Lecture Notes in Electrical Engineering - Information Technology Convergence, Secure and Trust Computing, and Data Management
◽
10.1007/978-94-007-5083-8_23
◽
2012
◽
pp. 179-186
Author(s):
Yee-Lee Er
◽
Wei-Chuen Yau
◽
Syh-Yuan Tan
◽
Bok-Min Goi
Keyword(s):
Public Key
◽
Encryption Scheme
◽
Public Key Encryption
◽
Certificateless Public Key Encryption
Download Full-text
A “Medium-Field” Multivariate Public-Key Encryption Scheme
Topics in Cryptology – CT-RSA 2006 - Lecture Notes in Computer Science
◽
10.1007/11605805_9
◽
2006
◽
pp. 132-149
◽
Cited By ~ 22
Author(s):
Lih-Chung Wang
◽
Bo-Yin Yang
◽
Yuh-Hua Hu
◽
Feipei Lai
Keyword(s):
Public Key
◽
Encryption Scheme
◽
Public Key Encryption
◽
Multivariate Public Key
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close