Search Results

There are 3663 results for: content related to: Elliptic-curve scalar multiplication algorithm using ZOT structure

  1. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2592–2611, Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  2. CP-ABE with outsourced decryption and directionally hidden policy

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2387–2396, Zhiwei Wang and Wenyang Liu

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1507

  3. Identity-based signcryption from lattices

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3751–3770, Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang and Wenbin Yao

    Version of Record online : 23 JUL 2015, DOI: 10.1002/sec.1297

  4. Towards fair mutual private set intersection with linear complexity

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1589–1612, Sumit Kumar Debnath and Ratna Dutta

    Version of Record online : 6 MAR 2016, DOI: 10.1002/sec.1450

  5. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Version of Record online : 19 MAY 2015, DOI: 10.1002/sec.1263

  6. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285

  7. Anonymous attribute-based proxy re-encryption for access control in cloud computing

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2397–2411, Yinghui Zhang, Jin Li, Xiaofeng Chen and Hui Li

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1509

  8. Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4157–4176, Y. Sreenivasa Rao and Ratna Dutta

    Version of Record online : 26 AUG 2015, DOI: 10.1002/sec.1331

  9. A practical strongly secure one-round authenticated key exchange protocol without random oracles

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1118–1131, Zheng Yang and Wu Yang

    Version of Record online : 9 SEP 2014, DOI: 10.1002/sec.1067

  10. Public-key encryption with keyword search secure against continual memory attacks

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1613–1629, Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou and Qiuliang Xu

    Version of Record online : 12 FEB 2016, DOI: 10.1002/sec.1451

  11. Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography

    Security and Communication Networks

    Vanga Odelu and Ashok Kumar Das

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1587

  12. Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1676–1697, Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda and Takashi Yamakawa

    Version of Record online : 2 MAR 2016, DOI: 10.1002/sec.1444

  13. Generic constructions of secure-channel free searchable encryption with adaptive security

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1547–1560, Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote

    Version of Record online : 25 SEP 2014, DOI: 10.1002/sec.1103

  14. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2214–2231, SK Hafizul Islam, Muhammad Khurram Khan and Ali M. Al-Khouri

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1165

  15. Generic transformations for existentially unforgeable signature schemes in the bounded leakage model

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1829–1842, Yuyu Wang and Keisuke Tanaka

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1436

  16. A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3167–3179, Haiyan Sun, Qiaoyan Wen, Hua Zhang and Zhengping Jin

    Version of Record online : 23 MAR 2015, DOI: 10.1002/sec.1241

  17. Biometric key-binding using lattice masking

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3405–3414, Masaya Yasuda and Yuka Sugimura

    Version of Record online : 1 MAY 2015, DOI: 10.1002/sec.1267

  18. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  19. Active jamming for multi-user information security improvement with the access statuses of users

    Security and Communication Networks

    Datong Xu, Pinyi Ren, Qinghe Du and Li Sun

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1592

  20. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing

    Security and Communication Networks

    Yinghui Zhang, Dong Zheng, Qi Li, Jin Li and Hui Li

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1574