The following pages link to (Q4364550):
Displaying 50 items.
- Combined schemes for signature and encryption: the public-key and the identity-based setting (Q259033) (← links)
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing (Q266836) (← links)
- How to construct efficient signcryption schemes on elliptic curves (Q293455) (← links)
- On the security of joint signature and encryption revisited (Q350517) (← links)
- Certificate-based signcryption with enhanced security features (Q356006) (← links)
- Signcryption with fast online signing and short signcryptext for secure and private mobile communication (Q362175) (← links)
- Group-oriented setting's multisigncryption scheme with threshold designcryption (Q433057) (← links)
- An ID-based signcryption scheme with compartmented secret sharing for unsigncryption (Q477604) (← links)
- A new threshold authenticated encryption scheme using labor-division signature (Q545432) (← links)
- Cryptanalysis of a certificateless signcryption scheme in the standard model (Q621650) (← links)
- Efficient proxy signcryption scheme with provable CCA and CMA security (Q623106) (← links)
- An efficient identity based generalized signcryption scheme (Q653334) (← links)
- Analysis and improvement of authenticatable ring signcryption scheme (Q655118) (← links)
- Improvement of digital signature with message recovery using self-certified public keys and its variants (Q702654) (← links)
- Provable secure identity based generalized signcryption scheme (Q708214) (← links)
- Analysis of improved signcryption scheme with key privacy (Q845700) (← links)
- Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext (Q893723) (← links)
- A convertible multi-authenticated encryption scheme for group communications (Q942321) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- New efficient and secure protocols for verifiable signature sharing and other applications (Q1582011) (← links)
- Identity-based aggregate signcryption in the standard model from multilinear maps (Q1712499) (← links)
- Improvement of Tseng et al.'s authenticated encryption scheme with message linkages (Q1765881) (← links)
- Policy controlled system with anonymity (Q1786597) (← links)
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing (Q1998834) (← links)
- Signcryption schemes with insider security in an ideal permutation model (Q2003346) (← links)
- Security under message-derived keys: signcryption in iMessage (Q2055665) (← links)
- Analysing the HPKE standard (Q2056674) (← links)
- Identity-based authenticated encryption with identity confidentiality (Q2067611) (← links)
- Privacy-preserving file sharing on cloud storage with certificateless signcryption (Q2143126) (← links)
- Vetted encryption (Q2152047) (← links)
- Generic construction of public key encryption, identity-based encryption and signcryption with equality test (Q2195385) (← links)
- Signcryption from randomness recoverable public key encryption (Q2269814) (← links)
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks (Q2293188) (← links)
- A provably secure proxy signcryption scheme using bilinear pairings (Q2336432) (← links)
- Conjugacy systems based on nonabelian factorization problems and their applications in cryptography (Q2336603) (← links)
- An efficient signcryption for data access control in cloud computing (Q2398117) (← links)
- Signcryption schemes with threshold unsigncryption, and applications (Q2439735) (← links)
- Provable certificateless generalized signcryption scheme (Q2448080) (← links)
- Secure identity-based signcryption in the standard model (Q2450504) (← links)
- Convertible multi-authenticated encryption scheme (Q2465980) (← links)
- A lattice-based signcryption scheme without random oracles (Q2515427) (← links)
- Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing (Q2515429) (← links)
- An efficient signcryption scheme with forward secrecy based on elliptic curve (Q2570759) (← links)
- Practical convertible authenticated encryption schemes using self-certified public keys (Q2571976) (← links)
- A secure anonymous proxy signcryption scheme (Q2628122) (← links)
- Constructing parallel long-message signcryption scheme from trapdoor permutation (Q2644418) (← links)
- On the Security of Tag-KEM for Signcryption (Q2864185) (← links)
- One-Round Attribute-Based Key Exchange in the Multi-party Setting (Q2953862) (← links)
- Signcryption Schemes Based on the Diffie–Hellman Problem (Q3000030) (← links)
- Hybrid Signcryption (Q3000034) (← links)