Non-interactive zero-knowledge and its applications
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
The digital signature standard
Communications of the ACM
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Authenticated encryption schemes with message linkage
Information Processing Letters
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Convertible authenticated encryption scheme
Journal of Systems and Software
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Everything Provable is Provable in Zero-Knowledge
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Signcryption Scheme with Signature Directly Verifiable by Public Key
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Number-theoretic constructions of efficient pseudo-random functions
Journal of the ACM (JACM)
A threshold signature scheme for group communications without a shared distribution center
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
Journal of the ACM (JACM)
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
New DSA-verifiable signcryption schemes
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
The ring authenticated encryption scheme - How to provide a clue wisely
Information Sciences: an International Journal
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks
Computer Communications
A chaos-based symmetric image encryption scheme using a bit-level permutation
Information Sciences: an International Journal
Improved convertible authenticated encryption scheme with provable security
Information Processing Letters
New identity-based key-insulated convertible multi-authenticated encryption scheme
Journal of Network and Computer Applications
Provably convertible multi-authenticated encryption scheme for generalized group communications
Information Sciences: an International Journal
Information Sciences: an International Journal
Hi-index | 0.07 |