Cited By
View all- Zhang XChen KDing JYang YZhang WYu N(2024)Provably Secure Public-Key Steganography Based on Elliptic Curve CryptographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336121919(3148-3163)Online publication date: 2024
- Lin KLin JCai SWang WZhao C(2024)Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degreesDesigns, Codes and Cryptography10.1007/s10623-024-01368-z92:6(1823-1843)Online publication date: 5-Mar-2024
- Zhou JLiu ZWang LZhao CLiu ZZhou L(2023)Practical and Malicious Multiparty Private Set Intersection for Small SetsElectronics10.3390/electronics1223485112:23(4851)Online publication date: 30-Nov-2023
- Show More Cited By




