Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications.
INFORMATICA(2023)
Key words
leakage attacks,signcryption,certificate-based public key system,leakage resilience
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined