Subject
General Computer Science,Theoretical Computer Science
Reference48 articles.
1. A method for obtaining digital signatures and public-key cryptosystems;Rivest;Communications of the ACM,1978
2. A public-key cryptosystem and a signature scheme based on discrete logarithms;ElGamal;IEEE Transactions on Information Theory,1985
3. New directions in cryptography;Diffie;IEEE Transactions on Information Theory,1976
4. Foundations of Cryptography: Basic Tools;Goldreich,2001
5. Theory and applications of trapdoor functions;Yao,1982
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Efficient Proxy Blind Signcryption Scheme for IoT;Computers, Materials & Continua;2022
2. Design of a Program Identification System for Preventing Malicious Codes;2019 15th International Conference on Computational Intelligence and Security (CIS);2019-12
3. Secure Email Login Based on Lightweight Asymmetric Identities;Proceedings of the 2019 the 9th International Conference on Communication and Network Security;2019-11-15
4. Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping;Proceedings of the 2019 the 9th International Conference on Communication and Network Security;2019-11-15
5. An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents;Security and Communication Networks;2017