Login / Signup
Breaking an ID-based encryption based on discrete logarithm and factorization problems.
Chik How Tan
Theo Fanuela Prabowo
Duc-Phong Le
Published in:
Inf. Process. Lett. (2016)
Keyphrases
</>
optimization problems
data sets
objective function
public key
continuous optimization