A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
New Signcryption Schemes Based on KCDSA
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
A Signcryption Scheme with Signature Directly Verifiable by Public Key
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Formal Proofs for the Security of Signcryption
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Simple and fast optimistic protocols for fair electronic exchange
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Formal Proofs for the Security of Signcryption
Journal of Cryptology
An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation
ARITH '07 Proceedings of the 18th IEEE Symposium on Computer Arithmetic
Information Sciences: an International Journal
Efficient generic on-line/off-line (threshold) signatures without key exposure
Information Sciences: an International Journal
The ring authenticated encryption scheme - How to provide a clue wisely
Information Sciences: an International Journal
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Two birds one stone: signcryption using RSA
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
A new signature scheme without random oracles from bilinear pairings
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
An efficient signcryption scheme with key privacy
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
A chaos-based symmetric image encryption scheme using a bit-level permutation
Information Sciences: an International Journal
A crypto-biometric scheme based on iris-templates with fuzzy extractors
Information Sciences: an International Journal
Provably convertible multi-authenticated encryption scheme for generalized group communications
Information Sciences: an International Journal
Certificate-based signcryption with enhanced security features
Computers & Mathematics with Applications
Hi-index | 0.07 |
In this paper, we present a method based on fuzzy transforms to establish dependencies between numerical attributes in datasets. We find the best fuzzy partitions of the attribute domains with respect to which we determine the direct and inverse fuzzy ...