Login / Signup

Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.

Mayana PereiraRafael DowsleyAnderson C. A. NascimentoGoichiro Hanaoka
Published in: Comput. J. (2015)
Keyphrases