Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-3 of 3 (Search time: 0.006 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
Secure MatchMaking Protocols

Lee, Byoungcheon; Kim, Kwangjo, Information Security and Cryptology — ICISC 2000 . LECTURE NOTES IN COMPUTER SCIENCE, v.2015, pp.123 - 134, 2000-12

2
Provably secure length-saving public-key encryption scheme under the computational Diffie-Hellman assumption

Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, ETRI JOURNAL, v.22, no.4, pp.25 - 31, 2000-12

3
Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption

Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, Information Security and Privacy. LECTURE NOTES IN COMPUTER SCIENCE, v.1841, pp.49 - 58, 2000

Discover

Subject

Author

rss_1.0 rss_2.0 atom_1.0