New Cryptosystem Using Multiple Cryptographic Assumptions (Report) More Books Like This

Practical Signcryption Practical Signcryption
2010
Provable Security Provable Security
2017
Innovative Security Solutions for Information Technology and Communications Innovative Security Solutions for Information Technology and Communications
2017
Information Security and Cryptology Information Security and Cryptology
2017
Cryptography and Cryptanalysis in Java Cryptography and Cryptanalysis in Java
2022
Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology
2017
Secure Searchable Encryption and Data Management Secure Searchable Encryption and Data Management
2021
Information Security and Cryptology – ICISC 2017 Information Security and Cryptology – ICISC 2017
2018
Pro Cryptography and Cryptanalysis with C++20 Pro Cryptography and Cryptanalysis with C++20
2021
Provable and Practical Security Provable and Practical Security
2022
The New Codebreakers The New Codebreakers
2016
Information Security and Privacy Information Security and Privacy
2017
Information Security Practice and Experience Information Security Practice and Experience
2011
Information Security and Privacy Information Security and Privacy
2016
Information Security Information Security
2018