欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
期刊
> 期刊详情页
How to compute modular exponentiation with large operators based on the right-to-left binary algorit
ISSN号:0096-3003
期刊名称:Applied Mathematics and Computation
时间:0
页码:280-292
语言:英文
相关项目:基于移动代理的密码理论体系及其应用
作者:
Cao, ZF|Sun, DZ|Sun, Y|
同期刊论文项目
基于移动代理的密码理论体系及其应用
期刊论文 43
会议论文 13
著作 1
同项目期刊论文
Provably secure robust threshold partial blind signature
Self-encryption remote user anonymous authentication scheme using smart cards
An improved deniable authentication protocol
Braid-based bit commitment protocol
ID-based authenticated key agreement protocol for peer-to-peer computing
Authenticated encryption protocol with perfect forward secrecy for mobile communication
Certificateless Authenticated Key Agreement Based on the MTI/C0 Protocol
Proofs of security for improved Rabin signature scheme
A Secure Proxy Signcryption Scheme Based on Discrete Logarithm Problem
Universal encrypted deniable authentication protocol
A New Practical Limited Identity- Based Encryption Scheme
Group Oriented Identity-Based Deniable Authentication Protocol from the Bilinear Pairings
Identity based proxy multi-signature
Provably secure identity-based authenticated key agreement protocols in the standard model
A new ID-based deniable authentication protocol
Improvement of Yang et al.'s threshold proxy signature scheme
Simple three-party key exchange protocol
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verificat
Efficient and secure protocol in fair document exchange
Designing efficient proxy signature schemes for mobile communication
New designing of cryptosystems based on quadratic fields
Efficient identity-based authenticated key agreement with PKG forward secrecy
Efficient certificateless authentication and key agreement (CL-AK) for grid computing
New cryptanalysis paradigm on a nonce-based mutual authentication scheme
Non-interactive and non-malleable commitment scheme based on q-one way group homomorphisms
A simple user authentication scheme for grid computing
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts
An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
A Self-Encryption Remote User Anonymous Authentication Scheme Usina Smart Cards
Password-Based Group Key Agreement Protocol for Client-Server Application
Efficient Certificateless Authenticated Key Agreement Protocol from Pairings
A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial
Escrow-Free Certificate-Based Authenticated Key Agreement Protocol from Pairings
The Braid-Based Bit Commitment Protocol