2023-11 |
基於ECDH和短簽名的群組密鑰機制之分析與改良 |
conference |
pdf(1) |
2022-08 |
Quantum-resistant 1-out-of-N Oblivious Signatures from Lattices |
conference |
web page(182) |
2022-05 |
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation |
conference |
web page(239) |
2021-02 |
Partially Blind ECDSA Scheme and Its Application to Bitcoin |
conference |
pdf(334) |
2020-10 |
Defense against N-pixel Attacks based on Image Reconstruction |
conference |
pdf(280) |
2020-08 |
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism |
conference |
pdf(270) |
2020-08 |
Multi-value Private Information Retrieval using Homomorphic Encryption |
conference |
pdf(281) |
2020-08 |
An Enhanced Mondrian Anonymization Model based on Self-Organizing Map |
conference |
pdf(229) |
2020-07 |
Practical Predicate Encryption for Inner Product |
conference |
pdf(214) |
2019.04 |
An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications |
conference |
web page(366) |
2019-04 |
An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications |
conference |
pdf(283) |
2018-02 |
Policy-Controlled Signature from NTRU Lattice |
conference |
web page(386) |
2017-08 |
A survey of secret sharing schemes based on Latin squares |
conference |
web page(728) |
2017-05 |
An off-line mobile payment protocol providing double-spending detection |
conference |
web page(808) |
2016-12 |
NFC-based Mobile Payment Protocol with User Anonymity |
conference |
web page(665) |
2016-10 |
Security analysis of a NTRU-based mutual authentication scheme |
conference |
web page(613) |
2016 |
Two-in-one oblivious signatures secure in the random oracle model |
conference |
pdf(514) |
2015-12 |
An empirical comparison between kelly criterion and vince`s optimal F |
conference |
web page(541) |
2015-08 |
An adaptive Kelly betting strategy for finite repeated games |
conference |
pdf(466) |
2015-08 |
Security analysis of an anonymous authentication scheme based on smart cards and biometrics for multi-server environments |
conference |
pdf(332) |
2015-07 |
Semantic Secure Public Key Encryption with Filtered Equality Test |
conference |
pdf(717) |
2015-07 |
Semantic secure public key encryption with filtered equality test PKE-FET |
conference |
web page(555) |
2015 |
Efficient public key encryption with user-friendly keywords search for searchable cloud storage |
conference |
web page(660) |
2014-12 |
Pitfalls in an ultra-lightweight authentication protocol for low-cost RFID |
conference |
web page(851) |
2014-10 |
Security analysis and improvement of femtocell access control |
conference |
web page(857) |