[引用][C] Key Exchange, Encryption Decryption and Proxy Re-encryption using Pseudoinverses

M Shoukat - 2020 - CAPITAL UNIVERSITY