Processing math: 100%
World Scientific
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.
International Journal of Foundations of Computer Science cover

Volume 31, Issue 02 (February 2020)

No Access
Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS
  • Pages:157–174

https://doi.org/10.1142/S012905412050001X

No Access
CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution
  • Pages:175–191

https://doi.org/10.1142/S0129054120500021

No Access
Security of Auditing Protocols Against Subversion Attacks
  • Pages:193–206

https://doi.org/10.1142/S0129054120500033

No Access
A Unified Method for Private Exponent Attacks on RSA Using Lattices
  • Pages:207–231

https://doi.org/10.1142/S0129054120500045

No Access
Communication Performance Evaluation of the Locally Twisted Cube
  • Pages:233–252

https://doi.org/10.1142/S0129054120500057

No Access
Improved Hardness of Maximum Common Subgraph Problems on Labeled Graphs of Bounded Treewidth and Bounded Degree
  • Pages:253–273

https://doi.org/10.1142/S0129054120500069

No Access
Constrained k-Center Problem on a Convex Polygon
  • Pages:275–291

https://doi.org/10.1142/S0129054120500070