Post-quantum Commutative Deniable Encryption Algorithm
暂无分享,去创建一个
Nguyen Hieu Minh | Long Giang Nguyen | N. A. Moldovyan | Cong Manh Tran | Dmitriy N. Moldovyan | Quang Minh Le | Sy Tan Ho | Hai Vinh Nguyen
[1] Rafail Ostrovsky,et al. Efficient Non-interactive Secure Computation , 2011, EUROCRYPT.
[2] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[3] Duc Tam Nguyen,et al. Method for Pseudo-probabilistic Block Encryption , 2017, INISCOM.
[4] Alexander A. Nechaev,et al. Cryptographic Algorithms on Groups and Algebras , 2017 .
[5] Maged Hamada Ibrahim,et al. A Method for Obtaining Deniable Public-Key Encryption , 2009, Int. J. Netw. Secur..
[6] Tamer M. Barakat,et al. A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption , 2014, KSII Trans. Internet Inf. Syst..
[7] Nikolay A. Moldovyan,et al. Post-quantum signature algorithms based on the hidden discrete logarithm problem , 2018, Comput. Sci. J. Moldova.
[8] A. A. Moldovyan,et al. Finite Non-Commutative Associative Algebras as Carriers of Hidden Discrete Logarithm Problem , 2019, Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software".
[9] Tanja Lange,et al. Preface: Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings , 2018 .
[10] Duc Tam Nguyen,et al. Deniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic Ciphering , 2018 .
[11] Duc Tam Nguyen,et al. No-Key Protocol for Deniable Encryption , 2018 .
[12] Nikolay A. Moldovyan,et al. Stream Deniable-Encryption Algorithms , 2016, Comput. Sci. J. Moldova.
[13] Rafail Ostrovsky,et al. Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..
[14] Bo Meng,et al. A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext , 2009, J. Networks.
[15] Duc Tam Nguyen,et al. Pseudo-probabilistic block ciphers and their randomization , 2019, J. Ambient Intell. Humaniz. Comput..