Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Jiaxin Pan
Tightly-Secure Signatures From Chameleon Hash Functions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Unified Security Model of Authenticated Key Exchange With Specific Adversarial Capabilities
IET Information Security
Computer Networks
Software
Information Systems
Communications
Related publications
Tightly Secure Signatures From Lossy Identification Schemes
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
Building Provably Secure Block Ciphers From Cryptographic Hash Functions
International Journal of Computer Applications
CCA-Secure Public Key Encryption Without Group-Dependent Hash Functions
IEICE Transactions on Information and Systems
Electronic Engineering
Pattern Recognition
Hardware
Computer Vision
Electrical
Architecture
Artificial Intelligence
Software
Parameterized Hash Functions
Annales UMCS, Informatica
Cryptographic Hash Functions
Secure Virtualisation Using Hash Key Authentication
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
CCA-Secure IB-KEM From Identity-Based Extractable Hash Proof System
Computer Journal
Computer Science
Unconditionally-Secure Digital Signatures
On Hash Functions Using Checksums
International Journal of Information Security
Information Systems
Risk
Computer Networks
Communications
Reliability
Safety
Quality
Software