Published in

Springer, Lecture Notes in Computer Science, p. 290-301, 2005

DOI: 10.1007/11599548_25

Links

Tools

Export citation

Search in Google Scholar

Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes

Book chapter published in 2005 by Sherman S. M. Chow ORCID, Zhengjun Cao, Joseph K. Liu
Distributing this paper is prohibited by the publisher
Distributing this paper is prohibited by the publisher

Full text: Unavailable

Red circle
Preprint: archiving forbidden
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO