A Review of Signcryption Schemes Based on Hyper Elliptic Curve
暂无分享,去创建一个
[1] Neal Koblitz,et al. Hyperelliptic cryptosystems , 1989, Journal of Cryptology.
[2] Dennis Meert,et al. Bilinear Pairings in Cryptography , 2009 .
[3] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[4] Nizamuddin,et al. Efficient signcryption schemes based on Hyperelliptic curve cryptosystem , 2011, 2011 7th International Conference on Emerging Technologies.
[5] A. Nelasa,et al. Usage of Hyperelliptic Curves in the Digital Signature Protocol , 2006, 2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science.
[6] J. PREMALATHA,et al. Secure Signcryption on Hyper Elliptic Curve with Sensor-Based Random Number , 2015 .
[7] Xiaoyuan Yang,et al. Hyper-Elliptic Curves Cryptosystem Based Blind Signature , 2009, 2009 Pacific-Asia Conference on Knowledge Engineering and Software Engineering.
[8] Neal Koblitz,et al. A Family of Jacobians Suitable for Discrete Log Cryptosystems , 1988, CRYPTO.
[9] Muhammad Sher,et al. Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem , 2011, 8th International Conference on High-capacity Optical Networks and Emerging Technologies.
[10] Xuan Wu Zhou. Improved Signcryption Schemes Based on Hyper-Elliptic Curves Cryptosystem , 2010 .
[11] A. Menezes. An Introduction to Pairing-Based Cryptography , 2005 .
[12] C. Moler,et al. Advances in Cryptology , 2000, Lecture Notes in Computer Science.
[13] Ramachandran Ganesan,et al. A Novel Digital Envelope Approach for A Secure E-Commerce Channel , 2010, Int. J. Netw. Secur..
[14] Anuj Kumar Singh. A Review of Elliptic Curve based Signcryption Schemes , 2014 .
[15] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[16] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[17] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[20] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[21] Shehzad Ashraf Ch,et al. Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem , 2011 .
[22] Muhammad Sher,et al. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography , 2014, Multimedia Tools and Applications.
[23] Alfred Menezes,et al. Pairing-Based Cryptography at High Security Levels , 2005, IMACC.
[24] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[25] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..