| Keyword : signcryption
|
One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary Kazuki YONEYAMA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A
No. 6 ;
pp. 1124-1138
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Keyword: authenticated key exchange, strong forward secrecy, signcryption, | | Summary | Full Text:PDF(302.3KB) | |
|
Forgery of Provable Secure Short Signcryption Scheme Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A
No. 9 ;
pp. 1879-1880
Type of Manuscript:
Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Keyword: cryptography, signcryption, | | Summary | Full Text:PDF(62KB) | |
|
Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A
No. 1 ;
pp. 206-208
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography Keyword: cryptography, signcryption, | | Summary | Full Text:PDF(77KB) | |
|
On the Security of Signcryption Scheme with Key Privacy Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/04/01
Vol. E88-A
No. 4 ;
pp. 1093-1095
Type of Manuscript:
LETTER
Category: Information Security Keyword: cryptography, signcryption, | | Summary | Full Text:PDF(69.9KB) | |
| |
| |
| |
| |
| |
|
|