Login / Signup

Breaking an ID-based encryption based on discrete logarithm and factorization problems.

Chik How TanTheo Fanuela PrabowoDuc-Phong Le
Published in: Inf. Process. Lett. (2016)
Keyphrases
  • optimization problems
  • data sets
  • objective function
  • public key
  • continuous optimization