1. Authenticated encryption scheme with low computation cost;Horster;Electron. Lett.,1994
2. Authenticated encryption scheme without using a one-way function;Lee;Electron. Lett.,1995
3. Y. Zheng, Signcryption and its application in efficient public key solution ISW’97, in: Lecture Notes Computer Science, vol. 1397, 1998, pp. 291–312.
4. D. Pointcheval, I. Stern, Security proof for signature scheme, Eurocrypt’96, in: Lecture Notes Computer Science, vol. 1070, 1996, pp. 387–398.
5. Publicly verifiable authenticated encryption;Chang she Ma;Electron. Lett.,2003