Swee-Huay Heng

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Comment on: ``An efficient identity-based signature scheme with provable security
Information Sciences
2024-02-16Paper
A Generic Framework for Accountable Optimistic Fair Exchange Protocol
Information Security Practice and Experience
2023-06-30Paper
A generic framework for accountable optimistic fair exchange protocol
Symmetry
2019-07-10Paper
Cryptanalysis of an identity-based convertible undeniable signature scheme2017-10-23Paper
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
Nonlinear Dynamics
2016-12-16Paper
Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme
Cryptography and Communications
2016-07-01Paper
An efficient certificateless undeniable signature scheme
International Journal of Computer Mathematics
2015-07-30Paper
A provable secure pairing-free certificateless identification scheme
International Journal of Computer Mathematics
2015-07-30Paper
Differential attack on nine rounds of the SEED block cipher
Information Processing Letters
2014-04-14Paper
On the security of a modified Beth identity-based identification scheme
Information Processing Letters
2014-04-11Paper
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
International Journal of Computer Mathematics
2014-01-29Paper
Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS '09
Cryptology and Network Security
2012-07-20Paper
Hierarchical Identity-Based Identification Schemes
Security Technology
2010-04-23Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Security Mediated Certificateless Signatures
Applied Cryptography and Network Security
2009-03-10Paper
New Constructions of Universal Hash Functions Based on Function Sums
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
The power of identification schemes
International Journal of Applied Cryptography
2009-01-15Paper
The security of the FDH variant of Chaum's undeniable signature scheme
IEEE Transactions on Information Theory
2008-12-21Paper
Relations Among Security Notions for Undeniable Signature Schemes
Lecture Notes in Computer Science
2008-11-27Paper
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
Public Key Infrastructure
2008-06-12Paper
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication
Provable Security
2008-06-10Paper
3-Move Undeniable Signature Scheme
Lecture Notes in Computer Science
2008-05-06Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
scientific article; zbMATH DE number 2043349 (Why is no real title available?)2004-02-16Paper


Research outcomes over time


This page was built for person: Swee-Huay Heng