Cited By
View all- Chen CLai QLu YYu Y(2024)More Efficient Two-Stage Sampling Technique and Its ApplicationsData Security and Privacy Protection10.1007/978-981-97-8546-9_5(88-108)Online publication date: 25-Oct-2024
- Hanaoka GKatsumata SKimura KTakemure KYamada S(2024)Tighter Adaptive IBEs and VRFs: Revisiting Waters’ Artificial AbortTheory of Cryptography10.1007/978-3-031-78020-2_5(124-155)Online publication date: 2-Dec-2024
- Hofheinz DHostáková KLangrehr RUrsu B(2024)On Structure-Preserving Cryptography and LatticesPublic-Key Cryptography – PKC 202410.1007/978-3-031-57725-3_9(255-287)Online publication date: 15-Apr-2024
- Show More Cited By