As the most prevailing two-factor authentication mechanism,smart-card-based password authentication has been a subject of intensive research in the past two
Permutation polynomials (PPs) of the form (xq-x + c)q2-1/3+1 + x over Fq2 were presented by Li et al.(Finite Fields Appl 22:16-23,2013).More recently,we hav
Vectorial Boolean functions are used as the nonlinear components in stream ciphers.The security of the cipher system depends on the cryptographic properties
Wearable devices can be potentially captured or accessed in an unauthorized manner because of their physical nature.In such cases,they are in white-box atta
Efficient searching on encrypted data outsourced to the cloud remains a research challenge.Identity-based encryption with equality test (IBEET) scheme has r
Introduced in 2001, a ring signature is a type of digital signature that can be created by anyone in a group of people.In contrast to group signatures, ring