| Publication | Date of Publication | Type |
|---|
Practical verifiably encrypted signatures without random oracles Information Sciences | 2017-02-02 | Paper |
Certificate-based fair exchange protocol of Schnorr signatures in chosen-key model Fundamenta Informaticae | 2016-08-15 | Paper |
| Multisignature scheme based on discrete logarithms in the plain public key model | 2011-12-01 | Paper |
Enhanced certificate-based encryption from pairings Computers and Electrical Engineering | 2011-07-28 | Paper |
| Breaking Pomykala-Barabasz threshold proxy signature scheme | 2011-06-10 | Paper |
Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator Computers and Electrical Engineering | 2010-12-29 | Paper |
Security of self-certified signatures Information Processing Letters | 2010-09-01 | Paper |
Provably secure proxy-protected signature schemes based on RSA Computers and Electrical Engineering | 2009-05-07 | Paper |
Dynamic and efficient joint encryption scheme in the plain public key model Computers and Electrical Engineering | 2009-04-17 | Paper |
Cryptanalysis of ``an identity-based society oriented signature scheme with anonymous signers Information Processing Letters | 2009-03-23 | Paper |
Certificate-based fair exchange protocol of signatures from pairings Computer Networks | 2009-01-20 | Paper |
Certificate-based verifiably encrypted signatures from pairings Information Sciences | 2008-05-19 | Paper |
Self-certified Signatures Based on Discrete Logarithms Arithmetic of Finite Fields | 2007-11-15 | Paper |
A provably secure short signature scheme based on discrete logarithms Information Sciences | 2007-10-18 | Paper |
| scientific article; zbMATH DE number 5140763 (Why is no real title available?) | 2007-04-05 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Security of the design of time-stamped signatures Journal of Computer and System Sciences | 2006-06-30 | Paper |
Security of meta-He digital signature scheme based on factoring and discrete logarithms Applied Mathematics and Computation | 2005-11-22 | Paper |
Improvement of efficient proxy signature schemes using self-certified public keys Applied Mathematics and Computation | 2005-11-04 | Paper |
A new key authentication scheme for cryptosystems based on discrete logarithms Applied Mathematics and Computation | 2005-10-28 | Paper |
Security of a new digital signature scheme based on factoring and discrete logarithms International Journal of Computer Mathematics | 2005-10-27 | Paper |
Improvement of digital signature with message recovery using self-certified public keys and its variants Applied Mathematics and Computation | 2005-01-17 | Paper |
Proxy signature schemes based on factoring Information Processing Letters | 2003-01-22 | Paper |
Public-key cryptosystem over ring Z∣√−3∣/(2m) Electronics Letters | 1988-01-01 | Paper |