Author:
Singh Tej,Kumar Mukesh,Gelmecha Demissie Jabir,Thakur Ganesh Kumar,Tyagi Vikas,Sori Worku Jifara
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference33 articles.
1. Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) < cost (signature) + cost (encryption). CRYPTO’97, LNCS #1924. Springer-Verlag, Cham, pp 165–179
2. Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68:227–233
3. Malone-Lee J, Mao W (2003) Two birds one stone: signcryption using RSA. In: Proceedings of the Topics in Cryptology-CT-RSA’03, LNCS 2612, San Francisco, CA, USA, 13–17 April 2003; pp 210–224
4. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of the Advances in Cryptology-CRYPTO’84, LNCS 196, Santa Barbara, CA, USA, 19–22 August 1984, pp 47–53
5. Boneh D, Franklin M (2001) identity-based encryption from the weil pairing. In: Proceedings of the Advances in Cryptology-CRYPTO’01, LNCS 2139, Santa Barbara, CA, USA, 19–23 August 2001, pp 213–229
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献