Â

Semantic Scholar uses AI to extract papers important to this topic.

2017

2017

- Wei Teng, Geng Yang, Yang Xiang, Ting Zhang, Dongyang Wang
- IEEE Transactions on Cloud Computing
- 2017

With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloudâ€¦Â (More)

Is this relevant?

2017

2017

Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used inâ€¦Â (More)

Is this relevant?

2011

2011

A formal model of certificateless aggregate signcryption is proposed, which allows n different users to signcrypt n differentâ€¦Â (More)

Is this relevant?

2008

2008

- Yan Chen, Futai Zhang
- Wuhan University Journal of Natural Sciences
- 2008

Certificateless public key cryptography (CL-PKC) enjoys the advantage of identity based cryptography without suffering from itsâ€¦Â (More)

Is this relevant?

2006

2006

Under an adaptive chosen ciphertext attack (CCA2), the security of an encryption scheme must hold against adversaries that haveâ€¦Â (More)

Is this relevant?

2002

2002

- Jakob Jonsson
- 2002

We introduce the OAEP encoding method, which is an adaptation of the OAEP encoding method, replacing the last step of theâ€¦Â (More)

Is this relevant?

2001

2001

The last few months, several new results appeared about the OAEP construction, and namely the RSAâ€“OAEP cryptosystem. Whereas OAEPâ€¦Â (More)

Is this relevant?

2000

2000

We describe a new version of the elliptic curve encryption schemes PSEC (Provably Secure Elliptic Curve). PSEC{3 is a public-keyâ€¦Â (More)

Is this relevant?

1999

1999

We describe an elliptic curve encryption scheme, PSEC (provably secure elliptic curve encryption scheme), which has two versionsâ€¦Â (More)

Is this relevant?

1998

1998

We describe a novel public-key cryptosystem, EPOC (Efficient Probabilistic Public-Key Encryption), which has two versions: EPOC-1â€¦Â (More)

Is this relevant?