Font Size:
a
A
A
Keyword [chosen-ciphertext attacks]
Result: 1 - 4 | Page: 1 of 1
1.
Studies On Provably Secure Public-Key Encryption In The Standard Model
2.
Researches On Certificateless Proxy Re-encryption
3.
A Study On The Key Technique Of Leakage Resilient Cryptography
4.
Identity-Based Dual Receiver Encryption
<<First
<Prev Next>
Last>>
Jump to