Cited By
View all- Chen CLai QLu YYu Y(2024)More Efficient Two-Stage Sampling Technique and Its ApplicationsData Security and Privacy Protection10.1007/978-981-97-8546-9_5(88-108)Online publication date: 25-Oct-2024
- Hanaoka GKatsumata SKimura KTakemure KYamada S(2024)Tighter Adaptive IBEs and VRFs: Revisiting Waters’ Artificial AbortTheory of Cryptography10.1007/978-3-031-78020-2_5(124-155)Online publication date: 2-Dec-2024
- Tomita TShikata J(2024)Efficient Identity-Based Encryption with Tight Adaptive Anonymity from RLWEPost-Quantum Cryptography10.1007/978-3-031-62743-9_10(300-321)Online publication date: 12-Jun-2024
- Show More Cited By