Results 201 to 210 of about 121,764 (250)

Broadband Achromatic Programmable Electromagnetic Camouflage via Fluidic-Accessible Metasurface. [PDF]

open access: yesAdv Sci (Weinh)
Liu S   +14 more
europepmc   +1 more source

Exploring targeted therapy in retinal vasculopathy with cerebral leukoencephalopathy: a case report and review of literature. [PDF]

open access: yesFront Immunol
Tato-Moreno P   +7 more
europepmc   +1 more source

Evidence of latent-lytic replication in EBV-positive Burkitt lymphoma from whole genome and transcriptome sequencing

open access: yes
Legason I   +30 more
europepmc   +1 more source

Threshold Ring Signature Scheme based on the Curve

open access: yesThreshold Ring Signature Scheme based on the Curve
openaire  

An efficient multivariate threshold ring signature scheme

Computer Standards & Interfaces, 2021
Abstract At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with security reduction to the MQ problem and impersonation probability 2 3 . Petzoldt et al. (AAECC 2013) extended that protocol into a threshold ring signature scheme, which later was improved by Zhang and Zhao (NSS 2014).
Dung H. Duong   +3 more
openaire   +4 more sources

Cryptanalysis of multivariate threshold ring signature schemes

Information Processing Letters, 2023
In this note, the authors provide an attack on the anonymity of three multivariate threshold ring signatures. First, the authors provide the necessary background for understanding the building blocks needed to analyze multivariate threshold ring signatures. An important point to note is that after \(t\) or more users sign a message, a combiner computes
Satyam Omar   +2 more
openaire   +4 more sources

Certificateless Threshold Ring Signature

Information Sciences, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
chang, shuang   +3 more
openaire   +4 more sources

An efficient code-based threshold ring signature scheme

Journal of Information Security and Applications, 2019
Abstract Code based cryptography is a powerful and a promising alternative to the number theoretic cryptography as it is supposed to resist to the quantum computer. The migration to the post quantum hypothetical world requires the design of all the most important cryptographic primitives such as signature schemes.
Hafsa Assidi   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy