Stop the war!
Остановите войну!
for scientists:
default search action
Practical Signcryption 2010
- Alexander W. Dent, Yuliang Zheng:
Practical Signcryption. Information Security and Cryptography, Springer 2010, ISBN 978-3-540-89409-4 - Yuliang Zheng:
Introduction. 1-18
Security Models for Signcryption
- Jee Hea An, Tal Rabin:
Security for Signcryption: The Two-User Model. 21-42 - Joonsang Baek, Ron Steinfeld:
Security for Signcryption: The Multi-User Model. 43-53
Signcryption Schemes
- Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater:
Signcryption Schemes Based on the Diffie-Hellman Problem. 57-69 - Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater:
Signcryption Schemes Based on Bilinear Maps. 71-97 - Alexander W. Dent, John Malone-Lee:
Signcryption Schemes Based on the RSA Problem. 99-117
Construction Techniques
- Tor E. Bjørstad:
Hybrid Signcryption. 121-147 - Yevgeniy Dodis:
Concealment and Its Applications to Authenticated Encryption. 149-173 - Josef Pieprzyk, David Pointcheval:
Parallel Signcryption. 175-192
Extensions of Signcryption
- Xavier Boyen:
Identity-Based Signcryption. 195-216 - Alexander W. Dent:
Key Establishment Using Signcryption Techniques. 217-240 - Yang Cui, Goichiro Hanaoka:
Applications of Signcryption. 241-256
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.