-
3
-
-
0030231965
-
Proxy Signature: Delegation of the Power to Sign Messages
-
Mambo M., Usuda K., and Okamoto E. Proxy Signature: Delegation of the Power to Sign Messages. IEICE Transactions on Fundamentals vol. E79-A, No. 9 (1996) 1338-1353
-
(1996)
IEICE Transactions on Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
5
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption) « Cost(Signature) + Cost(Encryption)
-
Springer-Verlag
-
Zheng Y. Digital Signcryption or How to Achieve Cost (Signature & Encryption) « Cost(Signature) + Cost(Encryption). Crypto'97, LNCS 1294 (1997), Springer-Verlag 165-179
-
(1997)
Crypto'97, LNCS 1294
, pp. 165-179
-
-
Zheng, Y.1
-
11
-
-
84958765355
-
ID-based Blind Signature and Ring Signature from Pairings
-
Springer-Verlag
-
Zhang F., and Kim K. ID-based Blind Signature and Ring Signature from Pairings. Advances in Cryptology-Asiacrypt'02, LNCS 2501 (2002), Springer-Verlag 533-547
-
(2002)
Advances in Cryptology-Asiacrypt'02, LNCS 2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
12
-
-
33646532198
-
An Identity-based Ring Signature Scheme from Bilinear Pairings
-
Lin C.Y., and Wu T.C. An Identity-based Ring Signature Scheme from Bilinear Pairings. Cryptology ePrint Archive (2003)
-
(2003)
Cryptology ePrint Archive
-
-
Lin, C.Y.1
Wu, T.C.2
-
14
-
-
23944519368
-
A Ring Signature Scheme using Bilinear Pairings
-
Xu J., Zhang Z., and Feng D. A Ring Signature Scheme using Bilinear Pairings. Information Security Applications, 5th International Workshop, WISA 2004, LNCS 3325 (2004) 163-172
-
(2004)
Information Security Applications, 5th International Workshop, WISA 2004, LNCS 3325
, pp. 163-172
-
-
Xu, J.1
Zhang, Z.2
Feng, D.3
-
15
-
-
26444540788
-
Efficient Identity based Ring Signature
-
Cryptography and Network Security
-
Chow S., Yiu S., and Hui L. Efficient Identity based Ring Signature. Cryptography and Network Security. Third International Conference, ACNS 2005, LNCS 3531 (2005) 499-512
-
(2005)
Third International Conference, ACNS 2005, LNCS 3531
, pp. 499-512
-
-
Chow, S.1
Yiu, S.2
Hui, L.3
-
16
-
-
33645420820
-
A Separable Threshold Ring Signature Scheme
-
Liu J.K., Wei V.K., and Wong D.S. A Separable Threshold Ring Signature Scheme. Information Security and Cryptology-ICISC 2003, 6th International Conference Seoul, Korea, LNCS 2971 (2003) 352-369
-
(2003)
Information Security and Cryptology-ICISC 2003, 6th International Conference Seoul, Korea, LNCS 2971
, pp. 352-369
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
17
-
-
31444441499
-
Elliptic curve cryptography engineering
-
Cilardo A., Coppolino L., Mazzocca N., and Romano L. Elliptic curve cryptography engineering. Proceedings of the IEEE 94 2 (2006) 395-406
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 395-406
-
-
Cilardo, A.1
Coppolino, L.2
Mazzocca, N.3
Romano, L.4
-
18
-
-
17644394652
-
Elliptic curve cryptography
-
Fernandes A. Elliptic curve cryptography. Dr. Dobb's Journal vol. 24, No. 12 (1999) 56-62
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 56-62
-
-
Fernandes, A.1
-
20
-
-
84958948780
-
A signcryption scheme with signature directly verifiable by public key
-
Bao F., and Deng R.H. A signcryption scheme with signature directly verifiable by public key. Public Key Cryptography, PKC'98, LNCS 1431 (1998) 55-59
-
(1998)
Public Key Cryptography, PKC'98, LNCS 1431
, pp. 55-59
-
-
Bao, F.1
Deng, R.H.2
-
22
-
-
0040712314
-
How to Construct Efficient Signcryption Schemes on Elliptic Curves
-
Zheng Y., and Imai H. How to Construct Efficient Signcryption Schemes on Elliptic Curves. Inf. Process. Lett. 68 5 (1998) 227-233
-
(1998)
Inf. Process. Lett.
, vol.68
, Issue.5
, pp. 227-233
-
-
Zheng, Y.1
Imai, H.2
|