An Efficient Signature Scheme with Fast Online Signing.pdf (198.9 KB)
Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Att.pdf (75.4 KB)
Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function.pdf (204.1 KB)
New Balanced Boolean Functions with Good Cryptographic Properties.pdf (93.1 KB)
On the Security of a Conditional Proxy Re-Encryption.pdf (83.3 KB)
Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method.pdf (397.9 KB)
Security Vulnerability of ID-Based Key Sharing Schemes.pdf (79.6 KB)
Strong Anonymous Signature.pdf (100.8 KB)
Simple Backdoors on RSA Modulus by Using RSA Vulnerability.pdf (174.7 kB)
======================================================
continue to append.....
A Note on Factoring α-LSBS Moduli.pdf (60.8 KB)
Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06.pdf (70.0 KB)
Invisibly Sanitizable Signature without Pairings.pdf (75.1 KB)
Modeling Security Bridge Certificate Authority Architecture.pdf (407.3 KB)
Optimised Versions of the Ate and Twisted Ate Pairings.pdf (244.2 KB)
Practical Hierarchical Identity Based Encryption Scheme without Random Oracles.pdf (112.0 KB)
Unconditionally Secure Group Signatures.pdf (336.3 KB)