-
1
-
-
63449122349
-
Digital signcryption or how to achieve Cost (Signature & Encryption) << Cost (Signature) + Cost (Encryption)
-
Advances in Cryptology-CRYPTO'97, Springer-Verlag
-
Y. Zheng, "Digital signcryption or how to achieve Cost (Signature & Encryption) << Cost (Signature) + Cost (Encryption)," Advances in Cryptology-CRYPTO'97, LNCS 1294, pp. 165-179, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
2
-
-
4644332974
-
Signcryption schemes with forward secrecy
-
H.Y. Jung, K.S. Chang, D.H. Lee, and J.I. Lim, "Signcryption schemes with forward secrecy," Proceeding of Information Security Application-WISA 2001, pp. 403-475, 2001.
-
(2001)
Proceeding of Information Security Application-WISA
, pp. 403-475
-
-
Jung, H.Y.1
Chang, K.S.2
Lee, D.H.3
Lim, J.I.4
-
3
-
-
0040712314
-
How to construct efficient signcryption schemes on elliptic curves
-
Elsevier Inc
-
Y. Zheng, and H. Imai, "How to construct efficient signcryption schemes on elliptic curves," Information Processing Letters, Vol. 68, pp. 227-233, Elsevier Inc., 1998.
-
(1998)
Information Processing Letters
, vol.68
, pp. 227-233
-
-
Zheng, Y.1
Imai, H.2
-
4
-
-
25144467465
-
An efficient signcryption scheme with forward secrecy based on elliptic curve
-
Elsevier Inc
-
R.-J. Hwang, C.-H. Lai, and F.-F. Su, "An efficient signcryption scheme with forward secrecy based on elliptic curve," Journal of Applied Mathematics and Computation, Vol. 167, No. 2, pp. 870-881, Elsevier Inc., 2005.
-
(2005)
Journal of Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 870-881
-
-
Hwang, R.-J.1
Lai, C.-H.2
Su, F.-F.3
-
5
-
-
33947512019
-
Formal Proofs for the Security of Signcryption
-
J. Baek, R. Steinfeld, Y, Zheng, "Formal Proofs for the Security of Signcryption," Journal of Cryptology, Vol. 20, pp. 203-235, 2007.
-
(2007)
Journal of Cryptology
, vol.20
, pp. 203-235
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
6
-
-
11244267013
-
-
Springer-Verlag, New York
-
D. Hankerson, A. Menezes, and Scott Vanstone, "Guide to Elliptic Curve Cryptography," Springer-Verlag, New York, 2004.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
8
-
-
35048856922
-
Validation of elliptic curve public keys
-
Advances in Cryptology-PKC'03, Springer-Verlag
-
A. Antipa, D. Brown, A. Menezes, R. Struik, and S. Vanstone, "Validation of elliptic curve public keys," Advances in Cryptology-PKC'03, LNCS 2567, pp. 211-223, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 211-223
-
-
Antipa, A.1
Brown, D.2
Menezes, A.3
Struik, R.4
Vanstone, S.5
-
10
-
-
62949140659
-
-
M. Myers, C. Adams, D. Solo, and D. Kemp, Internet X.509 Certificate Request Message Format, RFC 2511, March 1999. Available at: http://www.ietf.org/rfc/rfc2511.txt
-
M. Myers, C. Adams, D. Solo, and D. Kemp, "Internet X.509 Certificate Request Message Format," RFC 2511, March 1999. Available at: http://www.ietf.org/rfc/rfc2511.txt
-
-
-
-
11
-
-
84956866842
-
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
-
Advances in Cryptology-PKC'99, Springer-Verlag
-
S. Blake-Wilson, and A. Menezes, "Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol", Advances in Cryptology-PKC'99, LNCS 1560, pp. 154-170, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1560
, pp. 154-170
-
-
Blake-Wilson, S.1
Menezes, A.2
|