-
1
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost(Signature) + Cost(Encryption)
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
2
-
-
0040712314
-
How to construct efficient signcryption schemes on elliptic curves
-
Zheng, Y., Imai, H.: How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters 68(5), 227-233 (1998)
-
(1998)
Information Processing Letters
, vol.68
, Issue.5
, pp. 227-233
-
-
Zheng, Y.1
Imai, H.2
-
3
-
-
33646911764
-
Threshold Signcryption Scheme Based on Elliptic Curve Cryptosystem and Verifiable Secret Sharing
-
September
-
Peng, C., Xiang, L.: Threshold Signcryption Scheme Based on Elliptic Curve Cryptosystem and Verifiable Secret Sharing. In: International Conference on Wireless Communications, Networking and Mobile Computing, vol. 2, pp. 1182-1185 (September 2005)
-
(2005)
International Conference on Wireless Communications, Networking and Mobile Computing
, vol.2
, pp. 1182-1185
-
-
Peng, C.1
Xiang, L.2
-
4
-
-
25144467465
-
An Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
-
Hwang, R.-J., Lai, C.-H., Su, F.-F.: An Efficient Signcryption Scheme With Forward Secrecy Based on Elliptic Curve. Applied Mathematics and Computation 167(2), 870-881 (2005)
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 870-881
-
-
Hwang, R.-J.1
Lai, C.-H.2
Su, F.-F.3
-
5
-
-
33947512019
-
Formal Proofs for the Security of Signcryption
-
Baek, J., Steinfeld, R., Zheng, Y.: Formal Proofs for the Security of Signcryption. Journal of Cryptology 20(2), 203-235 (2007)
-
(2007)
Journal of Cryptology
, vol.20
, Issue.2
, pp. 203-235
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
10
-
-
0043135196
-
Elliptic curve cryptosystem - The Answer to Strong, Fast Publickey Cryptography for Securing Constrained Environments
-
Vanstone, S.A.: Elliptic curve cryptosystem - The Answer to Strong, Fast Publickey Cryptography for Securing Constrained Environments. Information Security Technical Report 12(2), 78-87 (1997)
-
(1997)
Information Security Technical Report
, vol.12
, Issue.2
, pp. 78-87
-
-
Vanstone, S.A.1
-
12
-
-
84958960201
-
A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer
-
Imai, H., Zheng, Y. (eds.) PKC 1998. Springer, Heidelberg
-
Hasegawa, T., Nakajima, J., Matsui, M.: A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 182-194. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1431
, pp. 182-194
-
-
Hasegawa, T.1
Nakajima, J.2
Matsui, M.3
-
13
-
-
77954920932
-
An efficient dynamic group key agreement protocol for imbalanced wireless networks
-
Chuang, Y.-H., Tseng, Y.-M.: An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management 20(4), 167-180 (2010)
-
(2010)
International Journal of Network Management
, vol.20
, Issue.4
, pp. 167-180
-
-
Chuang, Y.-H.1
Tseng, Y.-M.2
-
14
-
-
43749092801
-
Provably Secure Constant Round Contributory Group Key Agreement
-
Dutta, R., Barua, R.: Provably Secure Constant Round Contributory Group Key Agreement. IEEE Transactions on Information Theory 54(5), 2007-2025 (2008)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.5
, pp. 2007-2025
-
-
Dutta, R.1
Barua, R.2
-
16
-
-
33646227667
-
Automated Security Protocol Analysis with the AVISPA Tool
-
Elsevier
-
Vigano, L.: Automated Security Protocol Analysis With the AVISPA Tool. Electronic Notes in Theoretical Computer Science, vol. 155, pp. 61-86. Elsevier (2006)
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.155
, pp. 61-86
-
-
Vigano, L.1
-
17
-
-
0019649307
-
On the security of public key protocols
-
IEEE
-
Dolev, D., Yao, A.C.-C.: On the security of public key protocols. In: FOCS, pp. 350-357. IEEE (1981)
-
(1981)
FOCS
, pp. 350-357
-
-
Dolev, D.1
Yao, A.C.-C.2
|