-
1
-
-
84865366436
-
An efficient and provably-secure certificateless signature scheme without bilinear pairings
-
He D, Chen J, Zhang R. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems 2012; 25(11):1432-1442.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.11
, pp. 1432-1442
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
2
-
-
84911991530
-
Further improvement of a certificateless signature scheme without pairing
-
Gong P, Li P. Further improvement of a certificateless signature scheme without pairing. International Journal of Communication Systems 2012. DOI: 10.1002/dac.2457.
-
(2012)
International Journal of Communication Systems
-
-
Gong, P.1
Li, P.2
-
4
-
-
84904406563
-
Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings
-
Tsai JL, Lo NW, Wu TC. Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. International Journal of Communication Systems 2012. DOI: 10.1002/dac.2388.
-
(2012)
International Journal of Communication Systems
-
-
Tsai, J.L.1
Lo, N.W.2
Wu, T.C.3
-
5
-
-
77949614782
-
Efficient and provably secure self-certified signature scheme
-
Beijing, China, October 22-24
-
Zhang J, Chen H, Geng Q. Efficient and provably secure self-certified signature scheme. Proceedings of the 5th International Conference on Active Media Technology, Beijing, China, October 22-24, 2009; 501-512.
-
(2009)
Proceedings of the 5th International Conference on Active Media Technology
, pp. 501-512
-
-
Zhang, J.1
Chen, H.2
Geng, Q.3
-
6
-
-
33646939672
-
On the security of a digital signature with message recovery using self-certified public key
-
IEEE: Wuhan, China, September 23-26
-
Zhang J, Zou W, Chen D, Wang Y. On the security of a digital signature with message recovery using self-certified public key. Proceedings of the 2005 International Conference on Wireless Communications, Networking and Mobile Computing, Vol. 2. IEEE: Wuhan, China, September 23-26, 2005; 1171-1174.
-
(2005)
Proceedings of the 2005 International Conference on Wireless Communications, Networking and Mobile Computing
, vol.2
, pp. 1171-1174
-
-
Zhang, J.1
Zou, W.2
Chen, D.3
Wang, Y.4
-
7
-
-
84872478146
-
Provably secure self-certified signature schemes with message recovery
-
Zhang S, Tang F, Lin C, Ke P. Provably secure self-certified signature schemes with message recovery. China Communications 2012; 9(10):112-119.
-
(2012)
China Communications
, vol.9
, Issue.10
, pp. 112-119
-
-
Zhang, S.1
Tang, F.2
Lin, C.3
Ke, P.4
-
8
-
-
84948973239
-
Message recovery for signature schemes based on the discrete logarithm problem
-
Perugia, Italy, May 9-12
-
Nyberg K, Rueppel R. Message recovery for signature schemes based on the discrete logarithm problem. Advances in Cryptology-EUROCRYPT'94, Perugia, Italy, May 9-12, 1994; 182-193.
-
(1994)
Advances in Cryptology-EUROCRYPT'94
, pp. 182-193
-
-
Nyberg, K.1
Rueppel, R.2
-
9
-
-
0006635568
-
A signature scheme with message recovery as secure as discrete logarithm
-
Singapore, November 14-18
-
Abe M, Okamoto T. A signature scheme with message recovery as secure as discrete logarithm. Advances in Cryptology-ASIACRYPT'99, Singapore, November 14-18, 1999; 378-389.
-
(1999)
Advances in Cryptology-ASIACRYPT'99
, pp. 378-389
-
-
Abe, M.1
Okamoto, T.2
-
10
-
-
25844508511
-
Practical convertible authenticated encryption schemes using self-certified public keys
-
Lv J, Wang X, Kim K. Practical convertible authenticated encryption schemes using self-certified public keys. Applied Mathematics and Computation 2005; 169(2):1285-1297.
-
(2005)
Applied Mathematics and Computation
, vol.169
, Issue.2
, pp. 1285-1297
-
-
Lv, J.1
Wang, X.2
Kim, K.3
-
11
-
-
82955221758
-
New proxy signature scheme with message recovery using verifiable self-certified public keys
-
Allahabad, India, September 15-17
-
Tiwari N, Padhye S. New proxy signature scheme with message recovery using verifiable self-certified public keys. 2011 2nd International Conference on Computer and Communication Technology (ICCCT), Allahabad, India, September 15-17, 2011; 539-544.
-
(2011)
2011 2nd International Conference on Computer and Communication Technology (ICCCT)
, pp. 539-544
-
-
Tiwari, N.1
Padhye, S.2
-
12
-
-
0037443344
-
Digital signature with message recovery using self-certified public keys and its variants
-
Tseng YM, Jan JK, Chien HY. Digital signature with message recovery using self-certified public keys and its variants. Applied Mathematics and Computation 2003; 136(2):203-214.
-
(2003)
Applied Mathematics and Computation
, vol.136
, Issue.2
, pp. 203-214
-
-
Tseng, Y.M.1
Jan, J.K.2
Chien, H.Y.3
-
13
-
-
5644259865
-
Improvement of digital signature with message recovery using self-certified public keys and its variants
-
Shao Z. Improvement of digital signature with message recovery using self-certified public keys and its variants. Applied mathematics and computation 2004; 159(2):391-399.
-
(2004)
Applied mathematics and computation
, vol.159
, Issue.2
, pp. 391-399
-
-
Shao, Z.1
-
14
-
-
9544253893
-
Digital signature with message recovery using self-certified public keys without trustworthy system authority
-
Chang YF, Chang CC, Huang HF. Digital signature with message recovery using self-certified public keys without trustworthy system authority. Applied Mathematics and Computation 2005; 161(1):211-227.
-
(2005)
Applied Mathematics and Computation
, vol.161
, Issue.1
, pp. 211-227
-
-
Chang, Y.F.1
Chang, C.C.2
Huang, H.F.3
-
15
-
-
33745637891
-
An improved digital signature with message recovery using self-certified public keys without trustworthy system authority
-
Merin, Czech Republic, January 21-27
-
Yoon EJ, Yoo KY. An improved digital signature with message recovery using self-certified public keys without trustworthy system authority. SOFSEM 2006: Theory and Practice of Computer Science, Merin, Czech Republic, January 21-27, 2006; 548-555.
-
(2006)
SOFSEM 2006: Theory and Practice of Computer Science
, pp. 548-555
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
16
-
-
79955638047
-
Improved convertible authenticated encryption scheme with provable security
-
Lin HY, Hsu CL, Huang SK. Improved convertible authenticated encryption scheme with provable security. Information Processing Letters 2011; 111(13):661-666.
-
(2011)
Information Processing Letters
, vol.111
, Issue.13
, pp. 661-666
-
-
Lin, H.Y.1
Hsu, C.L.2
Huang, S.K.3
-
17
-
-
33845642237
-
Cryptanalysis and improvement of practical convertible authenticated encryption schemes using self-certified public keys
-
Shao Z. Cryptanalysis and improvement of practical convertible authenticated encryption schemes using self-certified public keys. Informatica 2006; 17(4):577-586.
-
(2006)
Informatica
, vol.17
, Issue.4
, pp. 577-586
-
-
Shao, Z.1
-
18
-
-
84911981275
-
A source authentication scheme based on message recovery digital signature for multicast
-
Yang JH, Lin IC. A source authentication scheme based on message recovery digital signature for multicast. International Journal of Communication Systems 2013. DOI: 10.1002/dac.2494.
-
(2013)
International Journal of Communication Systems
-
-
Yang, J.H.1
Lin, I.C.2
-
19
-
-
84937570422
-
Self-certified public keys
-
Brighton, UK, April 8-11
-
Girault M. Self-certified public keys. Advances in Cryptology-EUROCRYPT'91, Brighton, UK, April 8-11, 1991; 490-497.
-
(1991)
Advances in Cryptology-EUROCRYPT'91
, pp. 490-497
-
-
Girault, M.1
-
20
-
-
70350537464
-
Comment on a digital signature scheme with using self-certified public keys
-
Chengdu, China, May 15-17
-
Zhang J, Chen H, Gao S, Geng Q. Comment on a digital signature scheme with using self-certified public keys. International Forum on Technology and Applications (IFITA' 09), Vol. 3, Chengdu, China, May 15-17, 2009; 678-680.
-
(2009)
International Forum on Technology and Applications (IFITA' 09)
, vol.3
, pp. 678-680
-
-
Zhang, J.1
Chen, H.2
Gao, S.3
Geng, Q.4
-
21
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. Journal of Cryptology 2000; 13(3):361-396.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
22
-
-
33846643950
-
Self-certified signature scheme from pairings
-
Shao Z. Self-certified signature scheme from pairings. Journal of Systems and Software 2007; 80(3):388-395.
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.3
, pp. 388-395
-
-
Shao, Z.1
|