-
1
-
-
63449122349
-
Digital signcryption or how to achieve Cost (Signature & Encryption) cost (Signature)+cost (Encryption)
-
Advances in cryptology - CryptoÕ97 Springer
-
Zheng Y (1997) Digital signcryption or how to achieve Cost (Signature & Encryption) cost (Signature)+cost (Encryption). In: Advances in cryptology - CryptoÕ97 LNCS 1294, Springer, pp 165-179
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
3
-
-
0040712314
-
How to construct efficient signcryption schemes on elliptic curves
-
PII S0020019098001677
-
Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68:227-233 (Pubitemid 128379473)
-
(1998)
Information Processing Letters
, vol.68
, Issue.5
, pp. 227-233
-
-
Zheng, Y.1
Imai, H.2
-
4
-
-
84947929166
-
Signcryption and its application in efficient public key solutions
-
Proceeding of ISW '97, Springer
-
Zheng Y (1998) Signcryption and its application in efficient public key solutions. In: Proceeding of ISW '97, LNCS vol 1396, Springer, pp 291-312
-
(1998)
LNCS
, vol.1396
, pp. 291-312
-
-
Zheng, Y.1
-
5
-
-
84958948780
-
A signcryption scheme with signature directly verifiable by public key
-
Proceedings of PKCÕ98 Springer
-
Bao F, Deng RH (1998) A signcryption scheme with signature directly verifiable by public key. In: Proceedings of PKCÕ98LNCS 1431, Springer pp 55-59
-
(1998)
LNCS
, vol.1431
, pp. 55-59
-
-
Bao, F.1
Deng, R.H.2
-
6
-
-
35048817852
-
Encrypted message authentication by firewalls
-
Proceedings of 1999 international workshop on practice and theory in public key cryptography (PKCÕ99), 1-3 March 1999, Kamakura, Japan Springer
-
Gamage C, Leiwo J, Zheng Y (1999) Encrypted message authentication by firewalls. In: Proceedings of 1999 international workshop on practice and theory in public key cryptography (PKCÕ99), 1-3 March 1999, Kamakura, JapanLNCS 1560, Springer, pp 69-81
-
(1999)
LNCS
, vol.1560
, pp. 69-81
-
-
Gamage, C.1
Leiwo, J.2
Zheng, Y.3
-
7
-
-
4644332974
-
Signcryption schemes with forward secrecy
-
Jung HY, Chang KS, Lee DH, Lim JI (2001) Signcryption schemes with forward secrecy. In: Proceeding of WISA 2, pp 403-475
-
(2001)
Proceeding of WISA
, vol.2
, pp. 403-475
-
-
Jung, H.Y.1
Chang, K.S.2
Lee, D.H.3
Lim, J.I.4
-
8
-
-
25144467465
-
An efficient signcryption scheme with forward secrecy based on elliptic curve
-
Elsevier Inc., DOI: 10.1016/j.amc.2004.06.124
-
Hwang RJ, Lai CH, Su FF (2005) An efficient signcryption scheme with forward secrecy based on elliptic curve. J Appl Math Comput (Elsevier Inc.), 167 (2):870-881. DOI: 10.1016/j.amc.2004.06.124
-
(2005)
J Appl Math Comput
, vol.167
, Issue.2
, pp. 870-881
-
-
Hwang, R.J.1
Lai, C.H.2
Su, F.F.3
-
11
-
-
67649607300
-
An elliptic curve-based signcryption scheme with forward secrecy
-
Toorani M, Beheshti AA (2009) An elliptic curve-based signcryption scheme with forward secrecy. J Appl Sci 9(6):1025-1035
-
(2009)
J Appl Sci
, vol.9
, Issue.6
, pp. 1025-1035
-
-
Toorani, M.1
Beheshti, A.A.2
-
12
-
-
84874156661
-
Elliptic curve signcryption with encrypted message authentication and forward secrecy
-
Elsayed M, Hasan E (2009) Elliptic curve signcryption with encrypted message authentication and forward secrecy. Int J Comput Sci Netw Sec 9(1)
-
(2009)
Int J Comput Sci Netw Sec
, vol.9
, Issue.1
-
-
Elsayed, M.1
Hasan, E.2
-
13
-
-
84874178600
-
New low complexity key exchange and encryption protocols for wireless sensor networks clusters based on elliptic curve cryptography
-
Said EK, Amr IH (2009) New low complexity key exchange and encryption protocols for wireless sensor networks clusters based on elliptic curve cryptography. In: Proceedings of the 2009 national conference on radio science. Cairo, Egypt
-
(2009)
Proceedings of the 2009 National Conference on Radio Science. Cairo, Egypt
-
-
Said, E.K.1
Amr, I.H.2
-
14
-
-
79959884566
-
An efficient key management scheme based on elliptic curve signcryption for heterogeneous wireless sensor networks
-
Hagras EA, Aly HH, Saied DI (2010) An efficient key management scheme based on elliptic curve signcryption for heterogeneous wireless sensor networks. UCST 1(2):459-474
-
(2010)
UCST
, vol.1
, Issue.2
, pp. 459-474
-
-
Hagras, E.A.1
Aly, H.H.2
Saied, D.I.3
-
15
-
-
79959899820
-
Energy efficient key management scheme based on elliptic curve signcryption for wireless sensor networks
-
National Telecommunication Institute, Egypt
-
Hagras EA, Aly HH, Saied DI (2011) Energy efficient key management scheme based on elliptic curve signcryption for wireless sensor networks. In: 28th NRSC'11 April 26-28, 2011, National Telecommunication Institute, Egypt
-
(2011)
28th NRSC'11 April 26-28, 2011
-
-
Hagras, E.A.1
Aly, H.H.2
Saied, D.I.3
|