Cited By
View all- Ishibashi RYoneyama K(2024)Big Data-based Authenticated Key Exchange Resilient to Ephemeral Key Leakage without Random OraclesJournal of Information Processing10.2197/ipsjjip.32.69032(690-709)Online publication date: 2024
- Alamati NPatranabis S(2024)Cryptographic Primitives with Hinting PropertyJournal of Cryptology10.1007/s00145-024-09502-937:3Online publication date: 23-Apr-2024
- Huang YWan JJiang ZZhou JFang JCao Z(2024)An Efficient Integer-Wise ReLU on TFHEInformation Security and Privacy10.1007/978-981-97-5025-2_9(161-179)Online publication date: 16-Jul-2024
- Show More Cited By