Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Yang CUI
CCA-Secure Public Key Encryption Without Group-Dependent Hash Functions
IEICE Transactions on Information and Systems
Electronic Engineering
Pattern Recognition
Hardware
Computer Vision
Electrical
Architecture
Artificial Intelligence
Software
Related publications
Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Adaptively-Secure, Non-Interactive Public-Key Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
On the Power of Public-Key Encryption in Secure Computation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Secure Virtualisation Using Hash Key Authentication
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
Building Secure Public Key Encryption Scheme From Hidden Field Equations
Security and Communication Networks
Computer Networks
Information Systems
Communications
Password–Authenticated Group Key Establishment From Smooth Projective Hash Functions
International Journal of Applied Mathematics and Computer Science
CCA-Secure IB-KEM From Identity-Based Extractable Hash Proof System
Computer Journal
Computer Science
Tightly-Secure Signatures From Chameleon Hash Functions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of a Multi-Use CCA-secure Proxy Re-Encryption Scheme
International Journal of Security and its Applications
Computer Science