|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 182 occurrences of 72 keywords
|
|
|
Results
Found 878 publication records. Showing 878 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
196 | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 |
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability |
178 | Chik How Tan |
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
169 | Chik How Tan |
Signcryption Scheme in Multi-user Setting without Random Oracles. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
decisional bilinear Diffie-Hellman assumption, Signcryption |
157 | Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt |
Efficient Constructions of Signcryption Schemes and Signcryption Composability. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
multi-user security, signcryption, generic construction |
130 | Dong Jin Kwak, Sang-Jae Moon |
Efficient Distributed Signcryption Scheme as Group Signcryption. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Public-key Cryptography, Group signature, Signcryption |
115 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
On the Security of Identity Based Ring Signcryption Schemes. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack |
115 | Changshe Ma |
Efficient Short Signcryption Scheme with Public Verifiability. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
provable security, Signcryption, tight reduction |
115 | Seung-Hyun Seo, Sang-Ho Lee |
A Secure and Flexible Multi-signcryption Scheme. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
Signcryption, multi-signature |
110 | Alexander W. Dent |
Hybrid Signcryption Schemes with Outsider Security. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
105 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Multi-Signcryption, Cryptanalysis, Provable Security, Bilinear Pairing, Signcryption, Random Oracle Model, Identity Based Cryptography |
105 | Chik How Tan |
Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Signcryption KEM scheme, Signcryption Tag-KEM scheme |
105 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
On the Connection Between Signcryption and One-Pass Key Establishment. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
Signcryption KEM, Signcryption, Key establishment |
105 | Qin Wang, Zhenfu Cao |
Two Proxy Signcryption Schemes from Bilinear Pairings. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
proxy signcryption, bilinear pairings, signcryption, proxy signature |
101 | Kristian Gjøsteen, Lillian Kråkmo |
Universally Composable Signcryption. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Secure messaging, signcryption, universal composability |
101 | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow |
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability |
101 | Yuliang Zheng 0001 |
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
High Order Residues, RSA, Signature, Public Key Encryption, Signcryption |
99 | Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish |
Versatile padding schemes for joint signature and encryption. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption |
97 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Identity-Based Hybrid Signcryption. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
87 | Jianhong Zhang, Shengnan Gao, Hua Chen, Qin Geng |
A Novel ID-Based Anonymous Signcryption Scheme. |
APWeb/WAIM |
2009 |
DBLP DOI BibTeX RDF |
anonymous signcryption, ID-based ring signature, security proof |
87 | Varad Kirtane, C. Pandu Rangan |
RSA-TBOS signcryption with proxy re-encryption. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
signcryption, proxy re-encryption |
87 | Sungduk Kim, Kyungjin Kim, Jaedong Jung, Dongho Won |
An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
proof of possession, signcryption, POP |
87 | Changshe Ma, Kefei Chen, Dong Zheng 0001, Shengli Liu 0001 |
Efficient and Proactive Threshold Signcryption. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
threshold signcryption, threshold approach, Network security, provable security, asynchronous network |
87 | Yuan Zhou, Zhenfu Cao, Rongxing Lu |
Constructing Secure Warrant-Based Proxy Signcryption Schemes. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
proxy Signcryption, provable security, integer factorization |
87 | Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon |
Security Analysis of Two Signcryption Schemes. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
digital signature, encryption, Signcryption |
84 | Haiyong Bao, Zhenfu Cao, Haifeng Qian |
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
|
83 | Ying Sun, Chunxiang Xu, Fagen Li, Yong Yu 0002 |
Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
83 | Xiaoyuan Yang 0002, Maotang Li, Lixian Wei, Yiliang Han |
New ECDSA-Verifiable Multi-receiver Generalization Signcryption. |
HPCC |
2008 |
DBLP DOI BibTeX RDF |
|
83 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, Neha Jain |
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Hassan M. Elkamchouchi, Abdel-Aty M. Emarah, Esam A. A. Hagras |
Public Key Multi-Message Signcryption (PK-MMS) Scheme For Secure Communication Systems. |
CNSR |
2007 |
DBLP DOI BibTeX RDF |
|
83 | Yiliang Han, Xiaoyuan Yang 0002, Ping Wei 0005, Yuming Wang, Yupu Hu |
ECGSC: Elliptic Curve Based Generalized Signcryption. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
|
83 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Analysis and Improvement of a Signcryption Scheme with Key Privacy. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
83 | Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 |
Formal Proofs for the Security of Signcryption. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
74 | Mingwu Zhang, Yusheng Zhong, Bo Yang 0003, Wenzheng Zhang |
Analysis and Improvement of an ID-Based Anonymous Signcryption Model. |
ICIC (1) |
2009 |
DBLP DOI BibTeX RDF |
anonymous signcryption, anonymity, bilinear pairings, unforgeability |
74 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
identity-based signcryption, multi-PKG, Ad hoc networks, provable security, bilinear pairings |
74 | Huaqun Wang, Hong Yu |
Cryptanalysis of Two Ring Signcryption Schemes. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography |
74 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Efficient Signcryption Key Encapsulation without Random Oracles. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Hybrid signcryption, KEM, tag-KEM, standard model |
74 | Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang |
The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
provably secure, signcryption, Identity based cryptography |
74 | S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, C. Pandu Rangan |
Efficient and Provably Secure Certificateless Multi-receiver Signcryption. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
Multi-receiver, Bilinear Pairing, Signcryption, Certificateless |
74 | ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng |
Constructing parallel long-message signcryption scheme from trapdoor permutation. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
parallel, signcryption, authenticated encryption, trapdoor permutations |
74 | Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow |
An Efficient Signcryption Scheme with Key Privacy. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Ciphertext Anonymity, Gap Diffie-Hellman, Signcryption, Key Privacy |
74 | Fagen Li, Yupu Hu, Chuanrong Zhang |
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
identity-based signcryption, Ad hoc networks, provable security, bilinear pairings |
74 | Benoît Libert, Jean-Jacques Quisquater |
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
Gap Diffie-Hellman groups, provable security, signcryption |
74 | Benoît Libert, Jean-Jacques Quisquater |
Improved Signcryption from q-Diffie-Hellman Problems. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
provable security, bilinear maps, signcryption |
74 | Yuliang Zheng 0001 |
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Secure Message Delivery/Storage, Security, Authentication, Digital Signature, Encryption, Public Key Cryptography, Key Distribution, Signcryption |
72 | Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu |
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
secret sharing, bilinear pairings, Group signature, signcryption, proxy signature, identity-based signature |
72 | Josef Pieprzyk, David Pointcheval |
Josef Pieprzyk, David Pointcheval. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
privacy, authentication, parallelization, Signcryption |
69 | Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 |
Formal Proofs for the Security of Signcryption. |
J. Cryptol. |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
An Improved Signcryption Scheme and Its Variation. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Tor E. Bjørstad, Alexander W. Dent |
Building Better Signcryption Schemes with Tag-KEMs. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
69 | Qianhong Wu, Yi Mu 0001, Willy Susilo, Fangguo Zhang |
Efficient Signcryption Without Random Oracles. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
69 | Fagen Li, Yupu Hu, Shuanggen Liu |
ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
69 | Meng Wang, Hui Li 0006, Zhijing Liu |
Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
69 | Changgen Peng, Xiang Li |
An Identity-Based Threshold Signcryption Scheme with Semantic Security. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
69 | Xiangxue Li, Kefei Chen |
Identity Based Proxy-Signcryption Scheme from Pairings. |
IEEE SCC |
2004 |
DBLP DOI BibTeX RDF |
|
69 | Dae Hyun Yum, Pil Joong Lee |
New Signcryption Schemes Based on KCDSA. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
63 | Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater |
Signcryption Schemes Based on Bilinear Maps. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
63 | Jee Hea An, Tal Rabin |
Security for Signcryption: The Two-User Model. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
63 | Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater |
Signcryption Schemes Based on the Diffie-Hellman Problem. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
63 | Xavier Boyen |
Identity-Based Signcryption. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
63 | Alexander W. Dent |
Key Establishment Using Signcryption Techniques. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
63 | Yang Cui 0001, Goichiro Hanaoka |
Applications of Signcryption. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
63 | Josef Pieprzyk, David Pointcheval |
Parallel Signcryption. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
63 | Alexander W. Dent, John Malone-Lee |
Signcryption Schemes Based on the RSA Problem. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
63 | Joonsang Baek, Ron Steinfeld |
Security for Signcryption: The Multi-User Model. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
63 | Tor E. Bjørstad |
Hybrid Signcryption. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
60 | S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Chandrasekaran Pandu Rangan |
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
Multiple Receivers, Provable Security, Signcryption, Identity-Based Cryptography |
60 | S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan |
Identity Based Aggregate Signcryption Schemes. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography |
60 | Manuel Barbosa, Pooya Farshim |
Certificateless signcryption. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
insider security, signcryption, certificateless |
60 | Mingwu Zhang, Bo Yang 0003, Shenglin Zhu, Wenzheng Zhang |
Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
autonomous trust domain, privacy, Trust management, assertion, signcryption |
60 | S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan |
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem |
60 | Mingwu Zhang, Bo Yang 0003, Shenglin Zhu, Wenzheng Zhang |
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
anonymity, signcryption, ring signature, unforgeability |
60 | Huiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen |
An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
pairings, Signcryption, identity-based cryptography |
60 | John Malone-Lee |
Signcryption with Non-interactive Non-repudiation. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
provable security, non-repudiation, Signcryption |
60 | Yi Mu 0001, Vijay Varadharajan |
Distributed Signcryption. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
Public-key Cryptography, Signcryption |
59 | Sherman S. M. Chow |
Verifiable Pairing and Its Applications. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security |
56 | Raylin Tso |
Signcryption Scheme with Standardized Verification Algorithm. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
56 | S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan |
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Yi Wang 0016, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu |
FPGA based DPA-resistant Unified Architecture for Signcryption. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Alexander W. Dent |
Hybrid Signcryption Schemes with Insider Security. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Ron Steinfeld, Yuliang Zheng 0001 |
A Signcryption Scheme Based on Integer Factorization. |
ISW |
2000 |
DBLP DOI BibTeX RDF |
|
54 | Omaima Bamasak, Ning Zhang 0001, Doug Edwards |
DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Jee Hea An, Yevgeniy Dodis, Tal Rabin |
On the Security of Joint Signature and Encryption. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
51 | Yiliang Han, Xiaolin Gui |
BPGSC: Bilinear Paring Based Genearlized SignCryption Scheme. |
GCC |
2009 |
DBLP DOI BibTeX RDF |
generalized signcryption, bilinear paring, digital signature, signcryption |
48 | Yevgeniy Dodis |
Concealment and Its Applications to Authenticated Encryption. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
48 | Yuliang Zheng 0001 |
Introduction. |
Practical Signcryption |
2010 |
DBLP DOI BibTeX RDF |
|
47 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
ECDL problem, GDH problem, signcryption, ECDSA |
45 | Fagen Li, Juntao Gao, Yupu Hu |
ID-Based Threshold Unsigncryption Scheme from Pairings. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
(t,n) threshold, signcryption, Identity-based cryptography, zero knowledge proof |
45 | Shahrokh Saeednia, Steve Kremer, Olivier Markowitch |
An Efficient Strong Designated Verifier Signature Scheme. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Designated verifier, Signature, Discrete logarithm, Signcryption |
45 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
42 | Mohsen Toorani, Ali Asghar Beheshti Shirazi |
A directly public verifiable signcryption scheme based on elliptic curves. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Yong Yu 0002, Bo Yang 0003, Xinyi Huang 0001, Mingwu Zhang |
Efficient Identity-Based Signcryption Scheme for Multiple Receivers. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Shanshan Duan, Zhenfu Cao |
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Namje Park, Howon Kim 0001, Kyoil Chung, Sungwon Sohn, Dongho Won |
XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Tsz Hon Yuen, Victor K. Wei |
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Qin Wang, Zhenfu Cao |
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Bok-Nyong Park, Jihoon Myung, Wonjun Lee 0001 |
ISSRP: A Secure Routing Protocol Using Identity-Based Signcryption Scheme in Ad-Hoc Networks. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
|
42 | John Malone-Lee, Wenbo Mao |
Two Birds One Stone: Signcryption Using RSA. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Mohamed Al-Ibrahim |
A Signcryption Scheme Based on Secret Sharing Technique. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Jun-Bum Shin, Kwangsu Lee, Kyungah Shim |
New DSA-Verifiable Signcryption Schemes. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 878 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|