Our laboratory is investigating the information security technology from a mathematical point of view.
Key Words:
Post-Quantum Cryptography, Pairing-Based Cryptography, Efficient Algorithms, Efficient Implementation, Provable Security, Security Applications