共 50 条
- [1] Efficient Constructions of Signcryption Schemes and Signcryption Composability PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 321 - 342
- [2] Cryptanalysis and improvement of signcryption schemes IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 149 - 151
- [3] Cryptoanalysis of Two Signcryption Schemes FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 65 - 68
- [4] Construction of Identity Based Signcryption Schemes INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 1 - 14
- [5] Identity Based Aggregate Signcryption Schemes PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 378 - +
- [6] Breaking and Building of Threshold Signcryption Schemes INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 108 - +
- [7] Security flaw of an ECC-based signcryption scheme with anonymity Int. J. Netw. Secur., 2013, 4 (317-320):
- [8] Analysis and improvement of two signcryption schemes Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (07): : 1731 - 1736
- [9] Signcryption schemes with threshold unsigncryption, and applications Designs, Codes and Cryptography, 2014, 70 : 323 - 345
- [10] ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 219 - 224