Implementation, Comparison, and Enhancement of Secure Communication Designs
暂无分享,去创建一个
[1] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[2] Yuh-Min Tseng,et al. A Revocable ID-based Signcryption Scheme , 2012, J. Inf. Hiding Multim. Signal Process..
[3] Anne Marsden,et al. International Organization for Standardization , 2014 .
[4] Heba Kamal Aslan,et al. On the security of two improved authenticated encryption schemes , 2013, Int. J. Secur. Networks.
[5] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[6] Ghada F. El Kabbany,et al. An Efficient Pipelined Technique for Signcryption Algorithms , 2014 .
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..
[9] Rajeev Gupta,et al. Performance Evaluation of Modified Signcryption Scheme , 2012 .
[10] Daniel R. L. Brown. Deniable Authentication with RSA and Multicasting , 2005, IACR Cryptol. ePrint Arch..
[11] Laura Savu,et al. Combining Public Key Encryption with Schnorr Digital Signature , 2012 .
[12] Claus-Peter Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.
[13] Alexis B. Carter,et al. Privacy and security of patient data in the pathology laboratory , 2013, Journal of pathology informatics.
[14] Ross J. Anderson,et al. Robustness Principles for Public Key Protocols , 1995, CRYPTO.