Deep search:Searching for "Cryptographic primitives" in 'KEYWORD Got 3 items.
index Title
1A secure threshold Paillier proxy signature scheme
Author(s):Pei-yih TING, Xiao-wei HUANG, Jun-...  Clicked:9180  Download:4017  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.3 P.206-213  DOI:10.1631/jzus.C0910493
2Quantum security analysis of a lattice-based oblivious transfer protocol
Author(s):Mo-meng Liu, Juliane Krämer, Yu-p...  Clicked:7506  Download:2309  Cited:0  <Full Text>  <PPT> 1208
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.9 P.1348-1369  DOI:10.1631/FITEE.1700039
3A leakage-resilient certificateless public key encryption scheme with CCA2 security
Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, ...  Clicked:6956  Download:2717  Cited:0  <Full Text>  <PPT> 1967
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493  DOI:10.1631/FITEE.1601849
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE