Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Saqib A. Kakvi
Tightly-Secure Signatures From Chameleon Hash Functions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Reinforcement Learning for Blackjack
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Tightly Secure Signatures From Lossy Identification Schemes
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
Building Provably Secure Block Ciphers From Cryptographic Hash Functions
International Journal of Computer Applications
CCA-Secure Public Key Encryption Without Group-Dependent Hash Functions
IEICE Transactions on Information and Systems
Electronic Engineering
Pattern Recognition
Hardware
Computer Vision
Electrical
Architecture
Artificial Intelligence
Software
Parameterized Hash Functions
Annales UMCS, Informatica
Cryptographic Hash Functions
Secure Virtualisation Using Hash Key Authentication
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
CCA-Secure IB-KEM From Identity-Based Extractable Hash Proof System
Computer Journal
Computer Science
Unconditionally-Secure Digital Signatures
On Hash Functions Using Checksums
International Journal of Information Security
Information Systems
Risk
Computer Networks
Communications
Reliability
Safety
Quality
Software