| Publication | Date of Publication | Type |
|---|
A secure authenticated semi-quantum key distribution scheme for semi-quantum environments Quantum Information Processing | 2025-01-24 | Paper |
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem Soft Computing | 2022-07-11 | Paper |
Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme Journal of Discrete Mathematical Sciences and Cryptography | 2022-02-16 | Paper |
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment Soft Computing | 2020-07-15 | Paper |
Provable secure certificate-based signature scheme from bilinear pairing | 2019-10-25 | Paper |
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem Soft Computing | 2019-08-15 | Paper |
An ElGamal-like secure channel free public key encryption with keyword search scheme International Journal of Foundations of Computer Science | 2019-06-24 | Paper |
scientific article; zbMATH DE number 6966248 (Why is no real title available?) | 2018-10-26 | Paper |
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps Soft Computing | 2018-10-22 | Paper |
A new self-certified convertible authenticated encryption scheme based on discrete logarithm problem Parallel Processing Letters | 2017-12-15 | Paper |
Cryptanalysis and improvement of a proxy signature with message recovery using self-certified public key Bulletin of the Korean Mathematical Society | 2016-08-16 | Paper |
A new three-party-authenticated key agreement scheme based on chaotic maps without password table Nonlinear Dynamics | 2015-08-27 | Paper |
An extended chaotic-maps-based protocol with key agreement for multiserver environments Nonlinear Dynamics | 2015-08-26 | Paper |
A new proxy signature scheme for a specified group of verifiers Information Sciences | 2014-08-01 | Paper |
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps Nonlinear Dynamics | 2014-02-19 | Paper |
An extended chaotic maps-based key agreement protocol with user anonymity Nonlinear Dynamics | 2013-01-04 | Paper |
A batch verification for multiple proxy signature Parallel Processing Letters | 2012-12-12 | Paper |
Two attacks on a two-factor user authentication in wireless sensor networks Parallel Processing Letters | 2012-12-12 | Paper |
A novel user authentication and privacy preserving scheme with smart cards for wireless communications Mathematical and Computer Modelling | 2012-08-24 | Paper |
Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy International Journal of Foundations of Computer Science | 2011-01-19 | Paper |
On-line password guessing attack on Lu-Cao key agreement protocol for secure authentication Journal of Discrete Mathematical Sciences and Cryptography | 2010-05-14 | Paper |
A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM International Journal of Foundations of Computer Science | 2009-06-23 | Paper |
An efficient multi-round anonymous auction protocol Journal of Discrete Mathematical Sciences and Cryptography | 2008-03-06 | Paper |
A password authentication scheme over insecure networks Journal of Computer and System Sciences | 2006-06-30 | Paper |
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures Applied Mathematics and Computation | 2006-04-28 | Paper |
A new blind signature based on the discrete logarithm problem for untraceability Applied Mathematics and Computation | 2005-06-13 | Paper |
scientific article; zbMATH DE number 2080695 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 1998329 (Why is no real title available?) | 2004-02-18 | Paper |
scientific article; zbMATH DE number 2006822 (Why is no real title available?) | 2003-11-23 | Paper |
A simple remote user authentication scheme Mathematical and Computer Modelling | 2003-10-14 | Paper |
A new key authentication scheme based on discrete logarithms Applied Mathematics and Computation | 2003-09-09 | Paper |
scientific article; zbMATH DE number 1876856 (Why is no real title available?) | 2003-05-14 | Paper |
An improvement of SPLICE/AS in WIDE against guessing attack Informatica (Vilnius) | 2002-02-28 | Paper |
scientific article; zbMATH DE number 1877162 (Why is no real title available?) | 2002-01-01 | Paper |