Applications of Signcryption
From MaRDI portal
Publication:3000039
DOI10.1007/978-3-540-89411-7_12zbMath1217.68084OpenAlexW390718403MaRDI QIDQ3000039
Publication date: 18 May 2011
Published in: Practical Signcryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89411-7_12
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Cites Work
- Formal proofs for the security of signcryption
- Finding a Small Root of a Univariate Modular Equation
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Identity-Based Cryptosystems and Signature Schemes
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Advances in Cryptology - CRYPTO 2003
- Public Key Cryptography - PKC 2005
- Selecting cryptographic key sizes
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Applications of Signcryption