共 50 条
- [21] A public key encryption scheme based on factoring and discrete logarithm JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2009, 12 (06): : 745 - 752
- [22] A Hybrid-key Based Image Encryption and Authentication Scheme with the Use of Ergodic Matrix 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 212 - 217
- [23] On the Security and Key Generation of the ZHFE Encryption Scheme ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 289 - 304
- [24] Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments IEEE ACCESS, 2019, 7 : 49232 - 49239
- [25] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
- [26] On the security of hybrid public-key encryption ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
- [28] A New Public-Key Encryption Scheme Journal of Computer Science and Technology, 2007, 22 : 95 - 102
- [29] Evolution of the McEliece Public Key Encryption Scheme INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 129 - 149