Noncommutative Lightweight Signcryption for Wireless Sensor Networks
暂无分享,去创建一个
[1] Patrick Dehornoy,et al. Using shifted conjugacy in braid-based cryptography , 2006, ArXiv.
[2] Jung Hee Cheon,et al. New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.
[3] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..
[4] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[5] James Hughes,et al. A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem , 2002, ACISP.
[6] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[7] Volker Gebhardt,et al. Conjugacy in Garside groups III: Periodic braids , 2006 .
[8] Patrick Dehornoy. Braid-based cryptography , 2004 .
[9] Jianhong Zhang,et al. A Novel Identity-Based Multi-Signcryption Scheme , 2009 .
[10] Alexander W. Dent,et al. Hybrid Signcryption Schemes with Outsider Security , 2005, ISC.
[11] Longjun Zhang,et al. A signcryption scheme for WEP in WLAN based on bilinear pairings , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[12] Delaram Kahrobaei,et al. Non-commutative digital signatures , 2012, Groups Complex. Cryptol..
[13] Yuliang Zheng,et al. Practical Signcryption , 2010, Information Security and Cryptography.
[14] Volker Gebhardt,et al. Conjugacy in Garside groups I: cyclings, powers and rigidity , 2006, math/0605230.
[15] Iris Anshel,et al. New Key Agreement Protocols in Braid Group Cryptography , 2001, CT-RSA.
[16] Vladimir Shpilrain,et al. An Authentication Scheme Based on the Twisted Conjugacy Problem , 2008, ACNS.
[17] Jang-Won Lee,et al. Towards generating secure keys for braid cryptography , 2007, Des. Codes Cryptogr..
[18] Mohsen Toorani,et al. A directly public verifiable signcryption scheme based on elliptic curves , 2009, 2009 IEEE Symposium on Computers and Communications.
[19] Minyi Guo,et al. HARVEST: A Task-objective Efficient Data Collection Scheme in Wireless Sensor and Actor Networks , 2011, 2011 Third International Conference on Communications and Mobile Computing.
[20] Wenbo Mao,et al. Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.
[21] Mianxiong Dong,et al. TinyBee: Mobile-Agent-Based Data Gathering System in Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Networking, Architecture, and Storage.
[22] Volker Gebhardt,et al. Conjugacy in Garside groups II: structure of the ultra summit set , 2006 .
[23] Jang-Won Lee,et al. New Signature Scheme Using Conjugacy Problem , 2002, IACR Cryptol. ePrint Arch..
[24] Jung Hee Cheon,et al. An Efficient Implementation of Braid Groups , 2001, ASIACRYPT.
[25] Andrei V. Kelarev,et al. Braid-based cryptography , 2005 .
[26] Samuel Maffre. A Weak Key Test for Braid Based Cryptography , 2006 .
[27] Tatsuaki Okamoto,et al. How to Enhance the Security of Public-Key Encryption at Minimum Cost , 1999, Public Key Cryptography.
[28] Zhenfu Cao,et al. One-more matching conjugate problem and security of braid-based signatures , 2007, ASIACCS '07.
[29] Don Coppersmith. Modifications to the Number Field Sieve , 2004, Journal of Cryptology.
[30] W. Marsden. I and J , 2012 .
[31] Maxim Prasolov. Small braids having a big Ultra Summit Set , 2009 .
[32] Zhenfu Cao,et al. New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems , 2010, Inscrypt.
[33] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[34] D. Goldfeld,et al. An algebraic method for public-key cryptography , 1999 .
[35] Zhenfu Cao,et al. Transitive Signatures from Braid Groups , 2007, INDOCRYPT.
[36] Tim Güneysu,et al. MicroECC: A Lightweight Reconfigurable Elliptic Curve Crypto-processor , 2011, 2011 International Conference on Reconfigurable Computing and FPGAs.
[37] Yupu Hu,et al. Post-Quantum Secure Hybrid Signcryption from Lattice Assumption , 2012 .
[38] Zhenfu Cao,et al. New public key cryptosystems based on non-Abelian factorization problems , 2013, Secur. Commun. Networks.
[39] Zhenfu Cao,et al. Conjugate adjoining problem in braid groups and new design of braid-based signatures , 2010, Science China Information Sciences.
[41] Ron Steinfeld,et al. A Signcryption Scheme Based on Integer Factorization , 2000, ISW.
[42] Ueli Maurer,et al. Abstract Models of Computation in Cryptography , 2005, IMACC.
[43] Fahad Bin Muhaya,et al. Lattice‐based signcryption , 2013, Concurr. Comput. Pract. Exp..
[44] Esam A. A. A. Hagras,et al. Energy efficient key management scheme based on elliptic curve signcryption for Wireless Sensor Networks , 2011, 2011 28th National Radio Science Conference (NRSC).