Linked e-resources
Details
Table of Contents
Introduction
Lattices
Public-key encryption
Identity-based encryption
Attribute-based encryption
Key Exchanges
Digital signatures.
Lattices
Public-key encryption
Identity-based encryption
Attribute-based encryption
Key Exchanges
Digital signatures.