Cited By
View all- Asghar HZhao BIkram MNguyen GKaafar DLamont SCoscia D(2023)Use of cryptography in malware obfuscationJournal of Computer Virology and Hacking Techniques10.1007/s11416-023-00504-y20:1(135-152)Online publication date: 25-Sep-2023
- Vaikuntanathan VWee HWichs D(2022)Witness Encryption and Null-IO from Evasive LWEAdvances in Cryptology – ASIACRYPT 202210.1007/978-3-031-22963-3_7(195-221)Online publication date: 5-Dec-2022
- Wee H(2022)Optimal Broadcast Encryption and CP-ABE from Evasive Lattice AssumptionsAdvances in Cryptology – EUROCRYPT 202210.1007/978-3-031-07085-3_8(217-241)Online publication date: 30-May-2022
- Show More Cited By