kfslogo د/ابراهيم فتحى عبيد العشرى
#
مجال البحث
1Telecommunications
2Based Encryption Revisited
3Jhanwar-Barua’s Identity
4-based encryption (IBE)
5based signature
6Practical Identity-Based
7Efficient Selective
8based encryption without random oracles
9 Secure Identity Based Encryption Without Random Oracles
10An identity based encryption scheme based on quadratic residues
11Efficient solution of rational conics
12A course in computational algebraic number theory
13On the Randomness of Legendre and Jacobi Sequences
14Identity-based Cryptography
15Mediated RSA
16Identity-based Encryption
17Quadratic Residuosity Assumption, IND-ID-CPA.

جميع الحقوق محفوطة ©للوحدة المركزية للبوابة الالكترونية جامعة كفرالشيخ