A directly public verifiable signcryption scheme based on elliptic curves
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[2] Yupu Hu,et al. Signcryption based on elliptic curve and its multi-party schemes , 2004, InfoSecu '04.
[3] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[4] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[5] Alfred Menezes,et al. An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..
[6] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..
[7] Kenneth H. Rosen. Elementary Number Theory: And Its Applications , 2010 .
[8] Mohsen Toorani,et al. Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve , 2008, 2008 International Conference on Computer and Electrical Engineering.
[9] Deep Medhi,et al. Performance analysis of IPSec protocol: encryption and authentication , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[10] Yuliang Zheng,et al. Encrypted Message Authentication by Firewalls , 1999, Public Key Cryptography.
[11] Bernie Mulgrew,et al. Proceedings IEEE International Conference on Communications , 1989 .
[12] Ren-Junn Hwang,et al. An efficient signcryption scheme with forward secrecy based on elliptic curve , 2005, Appl. Math. Comput..
[13] Ramesh Kumar Mohapatra,et al. Signcryption Schemes With Forward Secrecy Based on Elliptic Curve Cryptography , 2010 .
[14] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[15] Robert H. Deng,et al. A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.