# | مجال البحث |
| 1 | Telecommunications |
| 2 | Based Encryption Revisited |
| 3 | Jhanwar-Barua’s Identity |
| 4 | -based encryption (IBE) |
| 5 | based signature |
| 6 | Practical Identity-Based |
| 7 | Efficient Selective |
| 8 | based encryption without random oracles |
| 9 | Secure Identity Based Encryption Without Random Oracles |
| 10 | An identity based encryption scheme based on quadratic residues |
| 11 | Efficient solution of rational conics |
| 12 | A course in computational algebraic number theory |
| 13 | On the Randomness of Legendre and Jacobi Sequences |
| 14 | Identity-based Cryptography |
| 15 | Mediated RSA |
| 16 | Identity-based Encryption |
| 17 | Quadratic Residuosity Assumption, IND-ID-CPA. |