-
1
-
-
0345490607
-
Certificateless public key cryptography
-
LNCS 2894, Springer, Heidelberg
-
S.S.Al-Riyami, K. G. Paterson. Certificateless public key cryptography. Proc. Of Asiacrypt 2003, LNCS 2894, pp. 452-473. Springer, Heidelberg, 2003.
-
(2003)
Proc. of Asiacrypt 2003
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
LNCS 196, Springer, Heidelberg
-
A. Shamir. Identity-based cryptosystems and signature schemes. Proc. of CRYPTO 1984. LNCS 196, pp. 47-53. Springer, Heidelberg, 1984.
-
(1984)
Proc. of CRYPTO 1984
, pp. 47-53
-
-
Shamir., A.1
-
3
-
-
84874324906
-
Identity-based encryption from the Weil pairings
-
LNCS 3494, Springer-Verlag, Berlin
-
D. Boneh, M. Franklin. Identity-based encryption from the Weil pairings, Proc. Of Advances in Cryptology-Crypto 2001, LNCS 3494, Springer-Verlag, Berlin, 2001, pp. 213-229.
-
(2001)
Proc. of Advances in Cryptology-Crypto 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin., M.2
-
4
-
-
33744786523
-
On the security of certificateless signature schemes from asiacrypt 2003
-
LNCS 3810, Springer, Heidelberg
-
X. Huang, W. Susilo, Y. Mu, F. Zhang. On the security of certificateless signature schemes from asiacrypt 2003. Proc. of CANS 2005, LNCS 3810, pp. 13-25. Springer, Heidelberg, 2005.
-
(2005)
Proc. of CANS 2005
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang., F.4
-
5
-
-
35048832495
-
Generic construction of certificateless signature
-
LNCS 3108, Springer-Verlag
-
D. H. Yum, P. J. Lee. Generic construction of certificateless signature. Proc. of ACISP 2004, LNCS 3108, pp. 200-211, Springer-Verlag, 2004.
-
(2004)
Proc. of ACISP 2004
, pp. 200-211
-
-
Yum, D.H.1
Lee., P.J.2
-
6
-
-
33746370456
-
Key replacement attack against a generic construction of certificateless signature
-
LNCS 4058, Springer-Verlag
-
B.C. Hu, D.S.Wong, Z. Zhang, X. Deng. Key replacement attack against a generic construction of certificateless signature. Proc. of ACISP 2006. LNCS 4058, pp. 235-246, Springer-Verlag, 2006.
-
(2006)
Proc. of ACISP 2006
, pp. 235-246
-
-
Hu, B.C.1
Wong, D.S.2
Zhang, Z.3
Deng, X.4
-
7
-
-
33646852592
-
An efficient certificateless signature scheme
-
LNCS 3802, Springer-Verlag
-
M.C. Gorantla, A. Saxena. An efficient certificateless signature scheme. Proc. of CIS 2005. LNCS 3802, pp. 110-116, Springer-Verlag, 2005.
-
(2005)
Proc. of CIS 2005
, pp. 110-116
-
-
Gorantla, M.C.1
Saxena., A.2
-
8
-
-
38149060462
-
An attack on a certificateless signature scheme
-
Available online
-
X. Cao, K.G. Paterson, W. Kou, An Attack on a Certificateless Signature Scheme. In: Cryptography ePrint Archive. Available online: http://eprint.iacr. org/2006/367.
-
Cryptography EPrint Archive
-
-
Cao, X.1
Paterson, K.G.2
Kou, W.3
-
9
-
-
38049001959
-
Security analysis of two signature schemes and their improved schemes
-
LNCS 4705, Springer-Verlag
-
J. Zhang, J. Mao. Security analysis of two signature schemes and their improved schemes. Proc. of ICCSA 2007, LNCS 4705, Part I, pp. 589-602, Springer-Verlag, 2007.
-
(2007)
Proc. of ICCSA 2007
, Issue.PART I
, pp. 589-602
-
-
Zhang, J.1
Mao., J.2
-
10
-
-
38149080541
-
Certificateless signature revisited
-
LNCS 4586, Springer-Verlag
-
X. Huang, Y. Mu, W. Susilo, D.S. Wong, W. Wu. Certificateless signature revisited. Proc. of ACISP 2007, LNCS 4586, pp. 308-322, Springer-Verlag, 2007.
-
(2007)
Proc. of ACISP 2007
, pp. 308-322
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wong, D.S.4
Wu, W.5
-
11
-
-
56149108570
-
Breaking the short certificateless signature scheme
-
10.1016/j.ins.2008.08.024
-
K. Shim. Breaking the short certificateless signature scheme. Information Science, 179 (2009) 303-306. doi:10.1016/j.ins.2008.08.024
-
(2009)
Information Science
, vol.179
, pp. 303-306
-
-
Shim., K.1
-
12
-
-
84947906522
-
The exact security of digital signatures -how to sign with RSA and Rabin
-
LNCS 950, Springer-Verlag
-
M.Bellare, P.Rogaway. The exact security of digital signatures -how to sign with RSA and Rabin. Ptroc. of Eurocrypt'96, LNCS 950, pp. 399-416, Springer-Verlag, 1996.
-
(1996)
Ptroc. of Eurocrypt'96
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
13
-
-
0031619016
-
The random oracle methodology, revisited
-
R.Canetti, O.Goldreich, S.Halevi. The random oracle methodology, revisited. Proc. Of the 30th Annual Symposium on the Theory of Computing (STOC'98), pp. 209-218, 1998.
-
(1998)
Proc. of the 30th Annual Symposium on the Theory of Computing (STOC'98)
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
15
-
-
58149512474
-
An improved certificateless signature scheme secure in the standard model
-
H. Xiong, Z. Qin, F. Li. An improved certificateless signature scheme secure in the standard model. Fundamenta Informaticae, 88 (2008) 193-206.
-
(2008)
Fundamenta Informaticae
, vol.88
, pp. 193-206
-
-
Xiong, H.1
Qin, Z.2
Li., F.3
-
16
-
-
70350648522
-
Certificateless signature scheme without random oracles
-
LNCS 5576, Springer-Verlag
-
Y. Yuan, D. Li, L. Tian, H. Zhu. Certificateless signature scheme without random oracles. Proc. of ISA 2009, LNCS 5576, pp. 31-40, Springer-Verlag, 2009.
-
(2009)
Proc. of ISA 2009
, pp. 31-40
-
-
Yuan, Y.1
Li, D.2
Tian, L.3
Zhu., H.4
|