- On the security of the Winternitz one-time signature scheme
- Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption
- Secure computation of functionalities based on Hamming distance and its application to computing document similarity
- Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4
No comments:
Post a Comment
Note: only a member of this blog may post a comment.