Return to Article Details
A new public key encryption scheme based on two cryptographic assumptions
Download
Download PDF