Computation of discrete logarithms in prime fields
Designs, Codes and Cryptography
Efficient identification and signatures for smart cards
CRYPTO '89 Proceedings on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Communications of the ACM
Cryptography for PC/workstation security
ACM SIGICE Bulletin
How to share a function securely
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Communications of the ACM
Implementation of fast RSA key generation on smart cards
Proceedings of the 2002 ACM symposium on Applied computing
Generalization of Elliptic Curve Digital Signature Schemes
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
New Signcryption Schemes Based on KCDSA
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A Key Escrow System with Warrant Bounds
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A Study on the Proposed Korean Digital Signature Algorithm
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Proceedings of the 2003 workshop on New security paradigms
Generic Groups, Collision Resistance, and ECDSA
Designs, Codes and Cryptography
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Information Security and Cryptology
A novel access control protocol for secure sensor networks
Computer Standards & Interfaces
Secure roaming of key association scheme providing perfect forward secrecy in IEEE 802.16
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
Neighbor-List Based Pairwise Key Management Scheme in Wireless Sensor Networks
AMT '09 Proceedings of the 5th International Conference on Active Media Technology
Verifier-key-flexible universal designated-verifier signatures
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Efficient key management for preserving HIPAA regulations
Journal of Systems and Software
Security of IEEE 802.16 in mesh mode
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
To infinity and beyond: combined attack on ECC using points of low order
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
An updated survey on secure ECC implementations: attacks, countermeasures and cost
Cryptography and Security
Sequential aggregate signatures with lazy verification from trapdoor permutations
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Review: Dynamic key management in wireless sensor networks: A survey
Journal of Network and Computer Applications
International Journal of Communication Networks and Distributed Systems
Hi-index | 48.25 |