An ID-based signcryption scheme with compartmented secret sharing for unsigncryption
From MaRDI portal
Publication:477604
Recommendations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 1189396 (Why is no real title available?)
- scientific article; zbMATH DE number 1088233 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 4195886 (Why is no real title available?)
- scientific article; zbMATH DE number 5263446 (Why is no real title available?)
- Biclique Cryptanalysis of the Full AES
- Elliptic curves. Number theory and cryptography
- General secret sharing based on the Chinese remainder theorem with applications in e-voting
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- How to construct efficient signcryption schemes on elliptic curves
- How to share a secret
- Identity-based cryptosystems and signature schemes
- Information Security and Cryptology - ICISC 2003
- Public Key Cryptography – PKC 2004
- The Arithmetic of Elliptic Curves
Cited in
(2)
This page was built for publication: An ID-based signcryption scheme with compartmented secret sharing for unsigncryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477604)