# | مجال البحث |
1 | Telecommunications |
2 | Based Encryption Revisited |
3 | Jhanwar-Barua’s Identity |
4 | -based encryption (IBE) |
5 | based signature |
6 | Practical Identity-Based |
7 | Efficient Selective |
8 | based encryption without random oracles |
9 | Secure Identity Based Encryption Without Random Oracles |
10 | An identity based encryption scheme based on quadratic residues |
11 | Efficient solution of rational conics |
12 | A course in computational algebraic number theory |
13 | On the Randomness of Legendre and Jacobi Sequences |
14 | Identity-based Cryptography |
15 | Mediated RSA |
16 | Identity-based Encryption |
17 | Quadratic Residuosity Assumption, IND-ID-CPA. |