Author:
Meshram Chandrashekhar,Li Chun-Ta,Meshram Sarita Gajbhiye
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference55 articles.
1. Bellare M, Namprempre C, Neven G (2009) Security proofs for identity based identification and signature schemes. J Cryptol 22:1–61
2. Boneh D, Boyen X (2008) Short signatures without random oracles the SDH assumption in bilinear groups. J Cryptol 2:149–177
3. Cha J, Cheon J (2003) An identity-based signature from gap Diffie Hellman groups. In: Proceedings of PKC’2003. Lecture notes in computer science. Springer, Berlin, vol 2567, pp 18–30
4. Chain K, Kuo WC (2013) A new digital signature scheme based on chaotic maps. Nonlinear Dyn 74:1003–1012
5. Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献