Convertible Multi-authenticated Encryption Scheme for Data Communication
暂无分享,去创建一个
[1] Wei Zhao,et al. Provably Secure Convertible Nominative Signature Scheme , 2008, Inscrypt.
[2] Yitao Chen,et al. Efficient identity-based authenticated multiple key exchange protocol - doi: 10.4025/actascitechnol.v35i4.16434 , 2013 .
[3] Yuliang Zheng,et al. Signcryption and Its Applications in Efficient Public Key Solutions , 1997, ISW.
[4] Min-Shiang Hwang,et al. A Study of Public Key Encryption with Keyword Search , 2013, Int. J. Netw. Secur..
[5] Patrick Horster,et al. Authenticated encryption schemes with low communication costs , 1994 .
[6] Ronald L. Rivest,et al. Responses to NIST's proposal , 1992, CACM.
[7] S. Araki,et al. The Limited Verifier Signature and Its Application , 1999 .
[8] Chin-Chen Chang,et al. A Smart Card-based Authentication Scheme Using User Identify Cryptography , 2013, Int. J. Netw. Secur..
[9] Jianhong Zhang,et al. On the security of a convertible authenticated encryption , 2005, Appl. Math. Comput..
[10] Jiqiang Lu,et al. Practical convertible authenticated encryption schemes using self-certified public keys , 2005, Appl. Math. Comput..
[11] Chien-Lung Hsu,et al. Convertible authenticated encryption scheme , 2002, J. Syst. Softw..
[12] Jia-Lun Tsai,et al. Convertible multi-authenticated encryption scheme with one-way hash function , 2009, Comput. Commun..
[13] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[14] Han-Yu Lin,et al. Convertible multi-authenticated encryption scheme , 2008, Inf. Sci..
[15] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[16] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[17] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[18] N. Koblitz. Elliptic curve cryptosystems , 1987 .