Font Size: a A A
Keyword [chosen-ciphertext attacks]
Result: 1 - 4 | Page: 1 of 1
1. Studies On Provably Secure Public-Key Encryption In The Standard Model
2. Researches On Certificateless Proxy Re-encryption
3. A Study On The Key Technique Of Leakage Resilient Cryptography
4. Identity-Based Dual Receiver Encryption
  <<First  <Prev  Next>  Last>>  Jump to